From bugzilla at redhat.com Wed Nov 1 15:04:10 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 1 Nov 2006 10:04:10 -0500 Subject: [RHSA-2006:0725-01] Moderate: qt security update Message-ID: <200611011504.kA1F4BXi015090@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: qt security update Advisory ID: RHSA-2006:0725-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0725.html Issue date: 2006-11-01 Updated on: 2006-11-01 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-4811 - --------------------------------------------------------------------- 1. Summary: Updated qt packages that correct an integer overflow flaw are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Qt is a software toolkit that simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. An integer overflow flaw was found in the way Qt handled certain pixmap images. If an application linked against Qt created a pixmap image in a certain way, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2006-4811) Users of Qt should upgrade to these updated packages, which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 211829 - CVE-2006-4811 qt integer overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/qt-2.3.1-12.EL2.src.rpm 172de071af27b97a7f5288e7631bcbc4 qt-2.3.1-12.EL2.src.rpm i386: ead15c619bc32aa0f40b9dbe0cccd517 qt-2.3.1-12.EL2.i386.rpm 14d45496f6ea9a424813dbb5780142e2 qt-Xt-2.3.1-12.EL2.i386.rpm 1c2f25193663dc8f9688047a397f18e4 qt-designer-2.3.1-12.EL2.i386.rpm 9e6d8262422bd6c5e002d18260890bce qt-devel-2.3.1-12.EL2.i386.rpm 8f3dee00f4bfd421b9624d19d8749ad4 qt-static-2.3.1-12.EL2.i386.rpm ia64: 840fe2321ffea68ab8794dd0b7e9c881 qt-2.3.1-12.EL2.ia64.rpm b0c0f0a0529ba133a310a8f3e5acdc51 qt-Xt-2.3.1-12.EL2.ia64.rpm 93f70e2c50513ddf335525c42e5ee3c0 qt-designer-2.3.1-12.EL2.ia64.rpm 34e5c46f4d58bf350b3444e16ab3da9c qt-devel-2.3.1-12.EL2.ia64.rpm 8af03a401773e06a150b8e276f5a1efd qt-static-2.3.1-12.EL2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/qt-2.3.1-12.EL2.src.rpm 172de071af27b97a7f5288e7631bcbc4 qt-2.3.1-12.EL2.src.rpm ia64: 840fe2321ffea68ab8794dd0b7e9c881 qt-2.3.1-12.EL2.ia64.rpm b0c0f0a0529ba133a310a8f3e5acdc51 qt-Xt-2.3.1-12.EL2.ia64.rpm 93f70e2c50513ddf335525c42e5ee3c0 qt-designer-2.3.1-12.EL2.ia64.rpm 34e5c46f4d58bf350b3444e16ab3da9c qt-devel-2.3.1-12.EL2.ia64.rpm 8af03a401773e06a150b8e276f5a1efd qt-static-2.3.1-12.EL2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/qt-2.3.1-12.EL2.src.rpm 172de071af27b97a7f5288e7631bcbc4 qt-2.3.1-12.EL2.src.rpm i386: ead15c619bc32aa0f40b9dbe0cccd517 qt-2.3.1-12.EL2.i386.rpm 14d45496f6ea9a424813dbb5780142e2 qt-Xt-2.3.1-12.EL2.i386.rpm 1c2f25193663dc8f9688047a397f18e4 qt-designer-2.3.1-12.EL2.i386.rpm 9e6d8262422bd6c5e002d18260890bce qt-devel-2.3.1-12.EL2.i386.rpm 8f3dee00f4bfd421b9624d19d8749ad4 qt-static-2.3.1-12.EL2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/qt-2.3.1-12.EL2.src.rpm 172de071af27b97a7f5288e7631bcbc4 qt-2.3.1-12.EL2.src.rpm i386: ead15c619bc32aa0f40b9dbe0cccd517 qt-2.3.1-12.EL2.i386.rpm 14d45496f6ea9a424813dbb5780142e2 qt-Xt-2.3.1-12.EL2.i386.rpm 1c2f25193663dc8f9688047a397f18e4 qt-designer-2.3.1-12.EL2.i386.rpm 9e6d8262422bd6c5e002d18260890bce qt-devel-2.3.1-12.EL2.i386.rpm 8f3dee00f4bfd421b9624d19d8749ad4 qt-static-2.3.1-12.EL2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/qt-3.1.2-14.RHEL3.src.rpm 9bb9f9baad9df9a2e0f212ad2f805619 qt-3.1.2-14.RHEL3.src.rpm i386: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm d2645cca7c6204b767681b5e3107434a qt-MySQL-3.1.2-14.RHEL3.i386.rpm 5836df16307118bc33dd9486deb51b3e qt-ODBC-3.1.2-14.RHEL3.i386.rpm 5869bccdc667a73d4e0cf3e85c18b7a1 qt-config-3.1.2-14.RHEL3.i386.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm f091d865dc63dccdfdf6bfc316691391 qt-designer-3.1.2-14.RHEL3.i386.rpm 20542bee5fa05e55954411192c65ab6e qt-devel-3.1.2-14.RHEL3.i386.rpm ia64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 7c6b66949a29a072bebe5043a9bfeda6 qt-3.1.2-14.RHEL3.ia64.rpm 00a5e47901973df234e421c889466a4f qt-MySQL-3.1.2-14.RHEL3.ia64.rpm 4450f80105e0b60623e850bdc63a730d qt-ODBC-3.1.2-14.RHEL3.ia64.rpm 48a733546f937c88fa0b0226ca8482d9 qt-config-3.1.2-14.RHEL3.ia64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm b633daf5f0b95f9236298a6473564c4b qt-debuginfo-3.1.2-14.RHEL3.ia64.rpm 50ebab6f9c36eb87736d22befae3cfe6 qt-designer-3.1.2-14.RHEL3.ia64.rpm 9b2b8783f32e73b1cde16e9d8a2c7043 qt-devel-3.1.2-14.RHEL3.ia64.rpm ppc: eb123e8918e907fb4368c2b3e30dd56e qt-3.1.2-14.RHEL3.ppc.rpm 95794f8af28f1bd8f906fe55fa400aac qt-3.1.2-14.RHEL3.ppc64.rpm 3769ff3b301baf302ad29024bd1461ca qt-MySQL-3.1.2-14.RHEL3.ppc.rpm fa3458602464e6dca6a709b48e2ed6ca qt-ODBC-3.1.2-14.RHEL3.ppc.rpm bacbcea750dbecbae69b2418f02ec501 qt-config-3.1.2-14.RHEL3.ppc.rpm c32d2f42a0ac7f1e9d233e0974f3ce32 qt-debuginfo-3.1.2-14.RHEL3.ppc.rpm f518348ba5dfab0a735dd68f53e84fbc qt-debuginfo-3.1.2-14.RHEL3.ppc64.rpm 6044d028270bf11a524eaf07cda98fe7 qt-designer-3.1.2-14.RHEL3.ppc.rpm 965ba14dffddbe364c5afc3c5f78ece8 qt-devel-3.1.2-14.RHEL3.ppc.rpm s390: f8f8b9ffcd5a7d73cd92d47e9e167834 qt-3.1.2-14.RHEL3.s390.rpm 7771c040708f0792ccd29bfbfb5adf68 qt-MySQL-3.1.2-14.RHEL3.s390.rpm 5e12a9fa5b30595b286731b9209484be qt-ODBC-3.1.2-14.RHEL3.s390.rpm 8be36789eec024722427ea0741e1e5bd qt-config-3.1.2-14.RHEL3.s390.rpm 1bf62c720c8a01ee208164ca92ff1dd6 qt-debuginfo-3.1.2-14.RHEL3.s390.rpm 2ff0622cb94ec95b429aaf0998442f4a qt-designer-3.1.2-14.RHEL3.s390.rpm e287eeff849c20d5240213a244fcf245 qt-devel-3.1.2-14.RHEL3.s390.rpm s390x: f8f8b9ffcd5a7d73cd92d47e9e167834 qt-3.1.2-14.RHEL3.s390.rpm 6709146e92c7e239478b2f1496ec2541 qt-3.1.2-14.RHEL3.s390x.rpm 5b9826ccd506ea05cceae2aa083e6876 qt-MySQL-3.1.2-14.RHEL3.s390x.rpm d15232a89ff6692e9b54b1d3237138f6 qt-ODBC-3.1.2-14.RHEL3.s390x.rpm c80c52d750d64acd1062c929bc91466c qt-config-3.1.2-14.RHEL3.s390x.rpm 1bf62c720c8a01ee208164ca92ff1dd6 qt-debuginfo-3.1.2-14.RHEL3.s390.rpm 975b58ab7abd77a1178aa1c868444de9 qt-debuginfo-3.1.2-14.RHEL3.s390x.rpm 83fde45cadb6bcad528531aca855263a qt-designer-3.1.2-14.RHEL3.s390x.rpm b3eca10a171029b77c51ad45210b8391 qt-devel-3.1.2-14.RHEL3.s390x.rpm x86_64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 596a0b6a4111a20440e211d56ff34647 qt-3.1.2-14.RHEL3.x86_64.rpm 3ac0c1881b7b6d0a62164155fa7698b2 qt-MySQL-3.1.2-14.RHEL3.x86_64.rpm 0bdde3f71be2e18d5b86c7ead7fb2fd1 qt-ODBC-3.1.2-14.RHEL3.x86_64.rpm 37bb48b6dd98574f22615bb412e283ed qt-config-3.1.2-14.RHEL3.x86_64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm 5d239010deae684435a3cb2497070597 qt-debuginfo-3.1.2-14.RHEL3.x86_64.rpm e56616aa922c8542e90d2fdf21ec0dc0 qt-designer-3.1.2-14.RHEL3.x86_64.rpm 30d29be398442022fc99cbd2009b52b7 qt-devel-3.1.2-14.RHEL3.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/qt-3.1.2-14.RHEL3.src.rpm 9bb9f9baad9df9a2e0f212ad2f805619 qt-3.1.2-14.RHEL3.src.rpm i386: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm d2645cca7c6204b767681b5e3107434a qt-MySQL-3.1.2-14.RHEL3.i386.rpm 5836df16307118bc33dd9486deb51b3e qt-ODBC-3.1.2-14.RHEL3.i386.rpm 5869bccdc667a73d4e0cf3e85c18b7a1 qt-config-3.1.2-14.RHEL3.i386.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm f091d865dc63dccdfdf6bfc316691391 qt-designer-3.1.2-14.RHEL3.i386.rpm 20542bee5fa05e55954411192c65ab6e qt-devel-3.1.2-14.RHEL3.i386.rpm x86_64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 596a0b6a4111a20440e211d56ff34647 qt-3.1.2-14.RHEL3.x86_64.rpm 3ac0c1881b7b6d0a62164155fa7698b2 qt-MySQL-3.1.2-14.RHEL3.x86_64.rpm 0bdde3f71be2e18d5b86c7ead7fb2fd1 qt-ODBC-3.1.2-14.RHEL3.x86_64.rpm 37bb48b6dd98574f22615bb412e283ed qt-config-3.1.2-14.RHEL3.x86_64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm 5d239010deae684435a3cb2497070597 qt-debuginfo-3.1.2-14.RHEL3.x86_64.rpm e56616aa922c8542e90d2fdf21ec0dc0 qt-designer-3.1.2-14.RHEL3.x86_64.rpm 30d29be398442022fc99cbd2009b52b7 qt-devel-3.1.2-14.RHEL3.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/qt-3.1.2-14.RHEL3.src.rpm 9bb9f9baad9df9a2e0f212ad2f805619 qt-3.1.2-14.RHEL3.src.rpm i386: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm d2645cca7c6204b767681b5e3107434a qt-MySQL-3.1.2-14.RHEL3.i386.rpm 5836df16307118bc33dd9486deb51b3e qt-ODBC-3.1.2-14.RHEL3.i386.rpm 5869bccdc667a73d4e0cf3e85c18b7a1 qt-config-3.1.2-14.RHEL3.i386.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm f091d865dc63dccdfdf6bfc316691391 qt-designer-3.1.2-14.RHEL3.i386.rpm 20542bee5fa05e55954411192c65ab6e qt-devel-3.1.2-14.RHEL3.i386.rpm ia64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 7c6b66949a29a072bebe5043a9bfeda6 qt-3.1.2-14.RHEL3.ia64.rpm 00a5e47901973df234e421c889466a4f qt-MySQL-3.1.2-14.RHEL3.ia64.rpm 4450f80105e0b60623e850bdc63a730d qt-ODBC-3.1.2-14.RHEL3.ia64.rpm 48a733546f937c88fa0b0226ca8482d9 qt-config-3.1.2-14.RHEL3.ia64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm b633daf5f0b95f9236298a6473564c4b qt-debuginfo-3.1.2-14.RHEL3.ia64.rpm 50ebab6f9c36eb87736d22befae3cfe6 qt-designer-3.1.2-14.RHEL3.ia64.rpm 9b2b8783f32e73b1cde16e9d8a2c7043 qt-devel-3.1.2-14.RHEL3.ia64.rpm x86_64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 596a0b6a4111a20440e211d56ff34647 qt-3.1.2-14.RHEL3.x86_64.rpm 3ac0c1881b7b6d0a62164155fa7698b2 qt-MySQL-3.1.2-14.RHEL3.x86_64.rpm 0bdde3f71be2e18d5b86c7ead7fb2fd1 qt-ODBC-3.1.2-14.RHEL3.x86_64.rpm 37bb48b6dd98574f22615bb412e283ed qt-config-3.1.2-14.RHEL3.x86_64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm 5d239010deae684435a3cb2497070597 qt-debuginfo-3.1.2-14.RHEL3.x86_64.rpm e56616aa922c8542e90d2fdf21ec0dc0 qt-designer-3.1.2-14.RHEL3.x86_64.rpm 30d29be398442022fc99cbd2009b52b7 qt-devel-3.1.2-14.RHEL3.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/qt-3.1.2-14.RHEL3.src.rpm 9bb9f9baad9df9a2e0f212ad2f805619 qt-3.1.2-14.RHEL3.src.rpm i386: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm d2645cca7c6204b767681b5e3107434a qt-MySQL-3.1.2-14.RHEL3.i386.rpm 5836df16307118bc33dd9486deb51b3e qt-ODBC-3.1.2-14.RHEL3.i386.rpm 5869bccdc667a73d4e0cf3e85c18b7a1 qt-config-3.1.2-14.RHEL3.i386.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm f091d865dc63dccdfdf6bfc316691391 qt-designer-3.1.2-14.RHEL3.i386.rpm 20542bee5fa05e55954411192c65ab6e qt-devel-3.1.2-14.RHEL3.i386.rpm ia64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 7c6b66949a29a072bebe5043a9bfeda6 qt-3.1.2-14.RHEL3.ia64.rpm 00a5e47901973df234e421c889466a4f qt-MySQL-3.1.2-14.RHEL3.ia64.rpm 4450f80105e0b60623e850bdc63a730d qt-ODBC-3.1.2-14.RHEL3.ia64.rpm 48a733546f937c88fa0b0226ca8482d9 qt-config-3.1.2-14.RHEL3.ia64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm b633daf5f0b95f9236298a6473564c4b qt-debuginfo-3.1.2-14.RHEL3.ia64.rpm 50ebab6f9c36eb87736d22befae3cfe6 qt-designer-3.1.2-14.RHEL3.ia64.rpm 9b2b8783f32e73b1cde16e9d8a2c7043 qt-devel-3.1.2-14.RHEL3.ia64.rpm x86_64: cecdc062e2ed6378753b685860a6dfdb qt-3.1.2-14.RHEL3.i386.rpm 596a0b6a4111a20440e211d56ff34647 qt-3.1.2-14.RHEL3.x86_64.rpm 3ac0c1881b7b6d0a62164155fa7698b2 qt-MySQL-3.1.2-14.RHEL3.x86_64.rpm 0bdde3f71be2e18d5b86c7ead7fb2fd1 qt-ODBC-3.1.2-14.RHEL3.x86_64.rpm 37bb48b6dd98574f22615bb412e283ed qt-config-3.1.2-14.RHEL3.x86_64.rpm 5942e1d4f2792980fe7c8f9c7f2bdfcb qt-debuginfo-3.1.2-14.RHEL3.i386.rpm 5d239010deae684435a3cb2497070597 qt-debuginfo-3.1.2-14.RHEL3.x86_64.rpm e56616aa922c8542e90d2fdf21ec0dc0 qt-designer-3.1.2-14.RHEL3.x86_64.rpm 30d29be398442022fc99cbd2009b52b7 qt-devel-3.1.2-14.RHEL3.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/qt-3.3.3-10.RHEL4.src.rpm e96c2079caaba15d4da427679c50b320 qt-3.3.3-10.RHEL4.src.rpm i386: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm b9cedf469bc4283642d65c094e22d885 qt-MySQL-3.3.3-10.RHEL4.i386.rpm deaf173be23d8938d4f621a6540f7301 qt-ODBC-3.3.3-10.RHEL4.i386.rpm 19525ace2952226f233cb30752640a69 qt-PostgreSQL-3.3.3-10.RHEL4.i386.rpm 0c7fac0ab371572b85a55aa3c00a14d1 qt-config-3.3.3-10.RHEL4.i386.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm bab89de21763006da22b46bd4da2d725 qt-designer-3.3.3-10.RHEL4.i386.rpm 9ac6a8be50a60907c8736da1d02a98a1 qt-devel-3.3.3-10.RHEL4.i386.rpm ia64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm 88bea8a52bf61e5cb9c915005a6deac0 qt-3.3.3-10.RHEL4.ia64.rpm 6adaf5ee21f41dd1a9a1b10b27357fa2 qt-MySQL-3.3.3-10.RHEL4.ia64.rpm 392aaf230957bd010c2c4d982c239977 qt-ODBC-3.3.3-10.RHEL4.ia64.rpm 06a2375719a64cad5fbeb98aadca29d3 qt-PostgreSQL-3.3.3-10.RHEL4.ia64.rpm 2143ecba6026bea49d971dc8b3242098 qt-config-3.3.3-10.RHEL4.ia64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm ca0cd6413db4f628a1061256382afd08 qt-debuginfo-3.3.3-10.RHEL4.ia64.rpm 665b39d1800ff2d938e0288183a01d43 qt-designer-3.3.3-10.RHEL4.ia64.rpm 6a0aae116c4c1ac42c3cfd83285640b0 qt-devel-3.3.3-10.RHEL4.ia64.rpm ppc: af899156603937f643aee411040819ae qt-3.3.3-10.RHEL4.ppc.rpm 4711e911443d4da04c1dfa6ca7f1ec8e qt-3.3.3-10.RHEL4.ppc64.rpm 7c3390672494adeec49a78e8f510ab2b qt-MySQL-3.3.3-10.RHEL4.ppc.rpm b803022c4fabc6cd68b3ec7454561946 qt-ODBC-3.3.3-10.RHEL4.ppc.rpm 25decf84def26479db5da4b724445e47 qt-PostgreSQL-3.3.3-10.RHEL4.ppc.rpm fd9b1a0bff5f16dfcf679ffa29113758 qt-config-3.3.3-10.RHEL4.ppc.rpm ac12826c19ebbdcbc8be0cff75642e89 qt-debuginfo-3.3.3-10.RHEL4.ppc.rpm 7dd3e107367043151849fd492679001e qt-debuginfo-3.3.3-10.RHEL4.ppc64.rpm 4d0509a6edca771ffbc24f5c8bd7a838 qt-designer-3.3.3-10.RHEL4.ppc.rpm 90c08159730b655c9035ac1ef3b37c39 qt-devel-3.3.3-10.RHEL4.ppc.rpm s390: 674006e7a60a8252c3daaf72ce15f915 qt-3.3.3-10.RHEL4.s390.rpm 9fc64ddd074d0c9fd23b742cbdae5e7f qt-MySQL-3.3.3-10.RHEL4.s390.rpm 6b60729ae65dca173f11fa732f4989d7 qt-ODBC-3.3.3-10.RHEL4.s390.rpm 56d3b38b64dc7fe02d1ff6056f327ca6 qt-PostgreSQL-3.3.3-10.RHEL4.s390.rpm 95d82ca2eaffe644902677772817a4e2 qt-config-3.3.3-10.RHEL4.s390.rpm 8f3aafbf40d80ea503a7b8e7a9243fb2 qt-debuginfo-3.3.3-10.RHEL4.s390.rpm a87168eb1dc412ee5e4e7aa9cecfe1b8 qt-designer-3.3.3-10.RHEL4.s390.rpm 90f75e6d3798afb0ba3d11f3a6396899 qt-devel-3.3.3-10.RHEL4.s390.rpm s390x: 674006e7a60a8252c3daaf72ce15f915 qt-3.3.3-10.RHEL4.s390.rpm ad7274344aa2f01f37aef5aa5836d9ab qt-3.3.3-10.RHEL4.s390x.rpm eb16006dfaf6c3b19c3c706591f0e598 qt-MySQL-3.3.3-10.RHEL4.s390x.rpm fa19babbbcacda561448136a8fe57d63 qt-ODBC-3.3.3-10.RHEL4.s390x.rpm ec383290556ee25b170cba560620b4a8 qt-PostgreSQL-3.3.3-10.RHEL4.s390x.rpm 0b0f9695fc9d85c534a7e24caa27a79e qt-config-3.3.3-10.RHEL4.s390x.rpm 8f3aafbf40d80ea503a7b8e7a9243fb2 qt-debuginfo-3.3.3-10.RHEL4.s390.rpm 2b9093c4df249f12f04be23062da1878 qt-debuginfo-3.3.3-10.RHEL4.s390x.rpm 728e59b495e9bbc25f2e9c2c0cd95923 qt-designer-3.3.3-10.RHEL4.s390x.rpm 908b9e83b1a380619f5ba35920cdc46e qt-devel-3.3.3-10.RHEL4.s390x.rpm x86_64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm dc152407e42498c66478db318201755c qt-3.3.3-10.RHEL4.x86_64.rpm 498631658224a5d27cb0c0f8c36e2f9a qt-MySQL-3.3.3-10.RHEL4.x86_64.rpm 8b2bbdc3536a4d1a3272f1a36fe9819c qt-ODBC-3.3.3-10.RHEL4.x86_64.rpm 6efc9ec471ef21ba44d86e497a589682 qt-PostgreSQL-3.3.3-10.RHEL4.x86_64.rpm 0c99c2596c245d97bf3d5247665472fb qt-config-3.3.3-10.RHEL4.x86_64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm 73c87d5e77e22b3e948f39085552b9a6 qt-debuginfo-3.3.3-10.RHEL4.x86_64.rpm d488f90b7518fabcbe03744eead9241e qt-designer-3.3.3-10.RHEL4.x86_64.rpm 754a5d20d242140186b49e88ea5c5884 qt-devel-3.3.3-10.RHEL4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/qt-3.3.3-10.RHEL4.src.rpm e96c2079caaba15d4da427679c50b320 qt-3.3.3-10.RHEL4.src.rpm i386: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm b9cedf469bc4283642d65c094e22d885 qt-MySQL-3.3.3-10.RHEL4.i386.rpm deaf173be23d8938d4f621a6540f7301 qt-ODBC-3.3.3-10.RHEL4.i386.rpm 19525ace2952226f233cb30752640a69 qt-PostgreSQL-3.3.3-10.RHEL4.i386.rpm 0c7fac0ab371572b85a55aa3c00a14d1 qt-config-3.3.3-10.RHEL4.i386.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm bab89de21763006da22b46bd4da2d725 qt-designer-3.3.3-10.RHEL4.i386.rpm 9ac6a8be50a60907c8736da1d02a98a1 qt-devel-3.3.3-10.RHEL4.i386.rpm x86_64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm dc152407e42498c66478db318201755c qt-3.3.3-10.RHEL4.x86_64.rpm 498631658224a5d27cb0c0f8c36e2f9a qt-MySQL-3.3.3-10.RHEL4.x86_64.rpm 8b2bbdc3536a4d1a3272f1a36fe9819c qt-ODBC-3.3.3-10.RHEL4.x86_64.rpm 6efc9ec471ef21ba44d86e497a589682 qt-PostgreSQL-3.3.3-10.RHEL4.x86_64.rpm 0c99c2596c245d97bf3d5247665472fb qt-config-3.3.3-10.RHEL4.x86_64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm 73c87d5e77e22b3e948f39085552b9a6 qt-debuginfo-3.3.3-10.RHEL4.x86_64.rpm d488f90b7518fabcbe03744eead9241e qt-designer-3.3.3-10.RHEL4.x86_64.rpm 754a5d20d242140186b49e88ea5c5884 qt-devel-3.3.3-10.RHEL4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/qt-3.3.3-10.RHEL4.src.rpm e96c2079caaba15d4da427679c50b320 qt-3.3.3-10.RHEL4.src.rpm i386: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm b9cedf469bc4283642d65c094e22d885 qt-MySQL-3.3.3-10.RHEL4.i386.rpm deaf173be23d8938d4f621a6540f7301 qt-ODBC-3.3.3-10.RHEL4.i386.rpm 19525ace2952226f233cb30752640a69 qt-PostgreSQL-3.3.3-10.RHEL4.i386.rpm 0c7fac0ab371572b85a55aa3c00a14d1 qt-config-3.3.3-10.RHEL4.i386.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm bab89de21763006da22b46bd4da2d725 qt-designer-3.3.3-10.RHEL4.i386.rpm 9ac6a8be50a60907c8736da1d02a98a1 qt-devel-3.3.3-10.RHEL4.i386.rpm ia64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm 88bea8a52bf61e5cb9c915005a6deac0 qt-3.3.3-10.RHEL4.ia64.rpm 6adaf5ee21f41dd1a9a1b10b27357fa2 qt-MySQL-3.3.3-10.RHEL4.ia64.rpm 392aaf230957bd010c2c4d982c239977 qt-ODBC-3.3.3-10.RHEL4.ia64.rpm 06a2375719a64cad5fbeb98aadca29d3 qt-PostgreSQL-3.3.3-10.RHEL4.ia64.rpm 2143ecba6026bea49d971dc8b3242098 qt-config-3.3.3-10.RHEL4.ia64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm ca0cd6413db4f628a1061256382afd08 qt-debuginfo-3.3.3-10.RHEL4.ia64.rpm 665b39d1800ff2d938e0288183a01d43 qt-designer-3.3.3-10.RHEL4.ia64.rpm 6a0aae116c4c1ac42c3cfd83285640b0 qt-devel-3.3.3-10.RHEL4.ia64.rpm x86_64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm dc152407e42498c66478db318201755c qt-3.3.3-10.RHEL4.x86_64.rpm 498631658224a5d27cb0c0f8c36e2f9a qt-MySQL-3.3.3-10.RHEL4.x86_64.rpm 8b2bbdc3536a4d1a3272f1a36fe9819c qt-ODBC-3.3.3-10.RHEL4.x86_64.rpm 6efc9ec471ef21ba44d86e497a589682 qt-PostgreSQL-3.3.3-10.RHEL4.x86_64.rpm 0c99c2596c245d97bf3d5247665472fb qt-config-3.3.3-10.RHEL4.x86_64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm 73c87d5e77e22b3e948f39085552b9a6 qt-debuginfo-3.3.3-10.RHEL4.x86_64.rpm d488f90b7518fabcbe03744eead9241e qt-designer-3.3.3-10.RHEL4.x86_64.rpm 754a5d20d242140186b49e88ea5c5884 qt-devel-3.3.3-10.RHEL4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/qt-3.3.3-10.RHEL4.src.rpm e96c2079caaba15d4da427679c50b320 qt-3.3.3-10.RHEL4.src.rpm i386: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm b9cedf469bc4283642d65c094e22d885 qt-MySQL-3.3.3-10.RHEL4.i386.rpm deaf173be23d8938d4f621a6540f7301 qt-ODBC-3.3.3-10.RHEL4.i386.rpm 19525ace2952226f233cb30752640a69 qt-PostgreSQL-3.3.3-10.RHEL4.i386.rpm 0c7fac0ab371572b85a55aa3c00a14d1 qt-config-3.3.3-10.RHEL4.i386.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm bab89de21763006da22b46bd4da2d725 qt-designer-3.3.3-10.RHEL4.i386.rpm 9ac6a8be50a60907c8736da1d02a98a1 qt-devel-3.3.3-10.RHEL4.i386.rpm ia64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm 88bea8a52bf61e5cb9c915005a6deac0 qt-3.3.3-10.RHEL4.ia64.rpm 6adaf5ee21f41dd1a9a1b10b27357fa2 qt-MySQL-3.3.3-10.RHEL4.ia64.rpm 392aaf230957bd010c2c4d982c239977 qt-ODBC-3.3.3-10.RHEL4.ia64.rpm 06a2375719a64cad5fbeb98aadca29d3 qt-PostgreSQL-3.3.3-10.RHEL4.ia64.rpm 2143ecba6026bea49d971dc8b3242098 qt-config-3.3.3-10.RHEL4.ia64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm ca0cd6413db4f628a1061256382afd08 qt-debuginfo-3.3.3-10.RHEL4.ia64.rpm 665b39d1800ff2d938e0288183a01d43 qt-designer-3.3.3-10.RHEL4.ia64.rpm 6a0aae116c4c1ac42c3cfd83285640b0 qt-devel-3.3.3-10.RHEL4.ia64.rpm x86_64: 31ab6c923d2e5fd4d6c69fb349ccc560 qt-3.3.3-10.RHEL4.i386.rpm dc152407e42498c66478db318201755c qt-3.3.3-10.RHEL4.x86_64.rpm 498631658224a5d27cb0c0f8c36e2f9a qt-MySQL-3.3.3-10.RHEL4.x86_64.rpm 8b2bbdc3536a4d1a3272f1a36fe9819c qt-ODBC-3.3.3-10.RHEL4.x86_64.rpm 6efc9ec471ef21ba44d86e497a589682 qt-PostgreSQL-3.3.3-10.RHEL4.x86_64.rpm 0c99c2596c245d97bf3d5247665472fb qt-config-3.3.3-10.RHEL4.x86_64.rpm 98c091e5d408b62f8bac3490428966b4 qt-debuginfo-3.3.3-10.RHEL4.i386.rpm 73c87d5e77e22b3e948f39085552b9a6 qt-debuginfo-3.3.3-10.RHEL4.x86_64.rpm d488f90b7518fabcbe03744eead9241e qt-designer-3.3.3-10.RHEL4.x86_64.rpm 754a5d20d242140186b49e88ea5c5884 qt-devel-3.3.3-10.RHEL4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFSLdQXlSAg2UNWIIRAuYMAJwKficKLS2m76Jc/3W7K8giJieLtwCdHIIO mXJ+Clrr4LeI9rgakn/c/IM= =UAFr -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Nov 6 23:26:01 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 6 Nov 2006 18:26:01 -0500 Subject: [RHSA-2006:0730-01] Important: php security update Message-ID: <200611062326.kA6NQBgs021656@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: php security update Advisory ID: RHSA-2006:0730-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0730.html Issue date: 2006-11-06 Updated on: 2006-11-06 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5465 - --------------------------------------------------------------------- 1. Summary: Updated PHP packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. The Hardened-PHP Project discovered an overflow in the PHP htmlentities() and htmlspecialchars() routines. If a PHP script used the vulnerable functions to parse UTF-8 data, a remote attacker sending a carefully crafted request could trigger the overflow and potentially execute arbitrary code as the 'apache' user. (CVE-2006-5465) Users of PHP should upgrade to these updated packages which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 213543 - CVE-2006-5465 PHP buffer overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/php-4.1.2-2.13.src.rpm a389b1cf12dd65bd9d04729739378649 php-4.1.2-2.13.src.rpm i386: f9a5f65907be43038ab1e82999c3a0b3 php-4.1.2-2.13.i386.rpm 9a8f4807f0cd8997fed434a752cb4b54 php-devel-4.1.2-2.13.i386.rpm 2c0b0590733c7c645f342974a3e8b2a9 php-imap-4.1.2-2.13.i386.rpm 55886207a47014fdb407cf49cdf758c2 php-ldap-4.1.2-2.13.i386.rpm 67376305696ea7234d6f5e06679b2d46 php-manual-4.1.2-2.13.i386.rpm 564d9fae44fc408a6c10ce70e4213916 php-mysql-4.1.2-2.13.i386.rpm 9bd1c859f6fa9ff1fea4c0d70bea1ee1 php-odbc-4.1.2-2.13.i386.rpm f8ba3c44aa016ac9aced6a3d04770157 php-pgsql-4.1.2-2.13.i386.rpm ia64: 5aecc913b9c48d8d44416b0ce068579f php-4.1.2-2.13.ia64.rpm 934d8d93821fbcfba027b749848f6fc8 php-devel-4.1.2-2.13.ia64.rpm be0500ad21a8d4fc2e529b1dd261666a php-imap-4.1.2-2.13.ia64.rpm 6f50842d9fcc32881c8786e81be19d5d php-ldap-4.1.2-2.13.ia64.rpm 364fc84f6e69022284be68ce0ee16d10 php-manual-4.1.2-2.13.ia64.rpm e6876036d08dd986fca2ab1b68782291 php-mysql-4.1.2-2.13.ia64.rpm 3b8f6512859a333fe87adaa4386418b1 php-odbc-4.1.2-2.13.ia64.rpm 2920f1d9bdf41cd81d4c2ad23aad83ed php-pgsql-4.1.2-2.13.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/php-4.1.2-2.13.src.rpm a389b1cf12dd65bd9d04729739378649 php-4.1.2-2.13.src.rpm ia64: 5aecc913b9c48d8d44416b0ce068579f php-4.1.2-2.13.ia64.rpm 934d8d93821fbcfba027b749848f6fc8 php-devel-4.1.2-2.13.ia64.rpm be0500ad21a8d4fc2e529b1dd261666a php-imap-4.1.2-2.13.ia64.rpm 6f50842d9fcc32881c8786e81be19d5d php-ldap-4.1.2-2.13.ia64.rpm 364fc84f6e69022284be68ce0ee16d10 php-manual-4.1.2-2.13.ia64.rpm e6876036d08dd986fca2ab1b68782291 php-mysql-4.1.2-2.13.ia64.rpm 3b8f6512859a333fe87adaa4386418b1 php-odbc-4.1.2-2.13.ia64.rpm 2920f1d9bdf41cd81d4c2ad23aad83ed php-pgsql-4.1.2-2.13.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/php-4.1.2-2.13.src.rpm a389b1cf12dd65bd9d04729739378649 php-4.1.2-2.13.src.rpm i386: f9a5f65907be43038ab1e82999c3a0b3 php-4.1.2-2.13.i386.rpm 9a8f4807f0cd8997fed434a752cb4b54 php-devel-4.1.2-2.13.i386.rpm 2c0b0590733c7c645f342974a3e8b2a9 php-imap-4.1.2-2.13.i386.rpm 55886207a47014fdb407cf49cdf758c2 php-ldap-4.1.2-2.13.i386.rpm 67376305696ea7234d6f5e06679b2d46 php-manual-4.1.2-2.13.i386.rpm 564d9fae44fc408a6c10ce70e4213916 php-mysql-4.1.2-2.13.i386.rpm 9bd1c859f6fa9ff1fea4c0d70bea1ee1 php-odbc-4.1.2-2.13.i386.rpm f8ba3c44aa016ac9aced6a3d04770157 php-pgsql-4.1.2-2.13.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/php-4.1.2-2.13.src.rpm a389b1cf12dd65bd9d04729739378649 php-4.1.2-2.13.src.rpm i386: f9a5f65907be43038ab1e82999c3a0b3 php-4.1.2-2.13.i386.rpm 9a8f4807f0cd8997fed434a752cb4b54 php-devel-4.1.2-2.13.i386.rpm 2c0b0590733c7c645f342974a3e8b2a9 php-imap-4.1.2-2.13.i386.rpm 55886207a47014fdb407cf49cdf758c2 php-ldap-4.1.2-2.13.i386.rpm 67376305696ea7234d6f5e06679b2d46 php-manual-4.1.2-2.13.i386.rpm 564d9fae44fc408a6c10ce70e4213916 php-mysql-4.1.2-2.13.i386.rpm 9bd1c859f6fa9ff1fea4c0d70bea1ee1 php-odbc-4.1.2-2.13.i386.rpm f8ba3c44aa016ac9aced6a3d04770157 php-pgsql-4.1.2-2.13.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/php-4.3.2-37.ent.src.rpm bf046ac10e41ce26a7a0189653b57acd php-4.3.2-37.ent.src.rpm i386: ed7499077777ccac9e77546405249ee1 php-4.3.2-37.ent.i386.rpm 64fc7d48d0fa05b9047606a485eb29d3 php-debuginfo-4.3.2-37.ent.i386.rpm 347be6ab3592cb744da1a909d0458137 php-devel-4.3.2-37.ent.i386.rpm a764a53a4bf366694583ec0b57afcc31 php-imap-4.3.2-37.ent.i386.rpm 07682e90cd1fe24c52bdb8131631ecb2 php-ldap-4.3.2-37.ent.i386.rpm 517a16f6dc384a6df3b4915e1c6583d9 php-mysql-4.3.2-37.ent.i386.rpm 128813456803652ad997cab7b392a843 php-odbc-4.3.2-37.ent.i386.rpm 490c79e14227457c8c935ed5aa4ba26e php-pgsql-4.3.2-37.ent.i386.rpm ia64: 648b8800529e14543fb85ac7a5fde75d php-4.3.2-37.ent.ia64.rpm 03e84ae67955dccface5c57411b77279 php-debuginfo-4.3.2-37.ent.ia64.rpm 92821b6e8da55dea0c870deee826a3f5 php-devel-4.3.2-37.ent.ia64.rpm f5815a8af4fd4df9a3fd5c184c54910d php-imap-4.3.2-37.ent.ia64.rpm e7e62ea263c31ca820f5369070a05952 php-ldap-4.3.2-37.ent.ia64.rpm 50ee0cfa37cb40f857ac5825b3be56da php-mysql-4.3.2-37.ent.ia64.rpm 1e2b2711a93335932e9e859cbad6f162 php-odbc-4.3.2-37.ent.ia64.rpm dcde09bfb2ac89ac9fba9b2b06361e3a php-pgsql-4.3.2-37.ent.ia64.rpm ppc: 32341e761513c4e7c561588696a33390 php-4.3.2-37.ent.ppc.rpm 3ce89a34a05128f76415f8cff174eb49 php-debuginfo-4.3.2-37.ent.ppc.rpm 41439d3dfffe25a3ecb543d121b7b5fb php-devel-4.3.2-37.ent.ppc.rpm e666c1b9d1b19623e7830d79914ea360 php-imap-4.3.2-37.ent.ppc.rpm 5aa29c738987082875d6b3d5921ef139 php-ldap-4.3.2-37.ent.ppc.rpm a6a6f04669ea946c8903ae32da99eefb php-mysql-4.3.2-37.ent.ppc.rpm 08ba70215f98bbbf325796533509cb17 php-odbc-4.3.2-37.ent.ppc.rpm 4eb54a995bbbde37e00f4a458dd08d59 php-pgsql-4.3.2-37.ent.ppc.rpm s390: b7dce85ce8d6de774f2d726fbd39c0b3 php-4.3.2-37.ent.s390.rpm 094d621efc78945ae3e850efc6b003d9 php-debuginfo-4.3.2-37.ent.s390.rpm 424e8521d42ea03de8522e5992564c17 php-devel-4.3.2-37.ent.s390.rpm 4d70c94d77b50975d613b90070dd2dfd php-imap-4.3.2-37.ent.s390.rpm d95ff2d5f0c05a2241dd9a16a6585d02 php-ldap-4.3.2-37.ent.s390.rpm 4c840608d683363255f681c20abce684 php-mysql-4.3.2-37.ent.s390.rpm 6a30b0102456cd2c312bb390daac6beb php-odbc-4.3.2-37.ent.s390.rpm 2b8f300a8a813eb5166b7be65d9489eb php-pgsql-4.3.2-37.ent.s390.rpm s390x: 1c3a580780f3fc679ac5cde6419d75e5 php-4.3.2-37.ent.s390x.rpm 1361d1595612a26aa20f1f57924331d7 php-debuginfo-4.3.2-37.ent.s390x.rpm 3de7ac5bb00d2576cdb00493fd98dca5 php-devel-4.3.2-37.ent.s390x.rpm 19c461115dfd50a702a4b4b7d3065c7f php-imap-4.3.2-37.ent.s390x.rpm e6ca295757e0f9bf6257be3d1a60dd5e php-ldap-4.3.2-37.ent.s390x.rpm b8298c9bf26182b719ad93b3bbc13133 php-mysql-4.3.2-37.ent.s390x.rpm 2cb1a097de23ff200dc776cc17dc5db8 php-odbc-4.3.2-37.ent.s390x.rpm 2b8b1c294a84d5181b9a9b0396ade01f php-pgsql-4.3.2-37.ent.s390x.rpm x86_64: 3098d16918a9971392dbc947738896b8 php-4.3.2-37.ent.x86_64.rpm 268878518411eff6a308ce42b3389229 php-debuginfo-4.3.2-37.ent.x86_64.rpm 8b1b6199c734b64cf49b0bcee67f067a php-devel-4.3.2-37.ent.x86_64.rpm 77eb040700cc8e67b6dc3a419addd656 php-imap-4.3.2-37.ent.x86_64.rpm f0cad87123de9eded5bf22206e701ba4 php-ldap-4.3.2-37.ent.x86_64.rpm 35291e8b5ff5c0e4e6b6e19dc89566d4 php-mysql-4.3.2-37.ent.x86_64.rpm da41b9d551747ed2c3e5174a65b0a943 php-odbc-4.3.2-37.ent.x86_64.rpm 59b82440c11498744f04d72b864c5587 php-pgsql-4.3.2-37.ent.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/php-4.3.2-37.ent.src.rpm bf046ac10e41ce26a7a0189653b57acd php-4.3.2-37.ent.src.rpm i386: ed7499077777ccac9e77546405249ee1 php-4.3.2-37.ent.i386.rpm 64fc7d48d0fa05b9047606a485eb29d3 php-debuginfo-4.3.2-37.ent.i386.rpm 347be6ab3592cb744da1a909d0458137 php-devel-4.3.2-37.ent.i386.rpm a764a53a4bf366694583ec0b57afcc31 php-imap-4.3.2-37.ent.i386.rpm 07682e90cd1fe24c52bdb8131631ecb2 php-ldap-4.3.2-37.ent.i386.rpm 517a16f6dc384a6df3b4915e1c6583d9 php-mysql-4.3.2-37.ent.i386.rpm 128813456803652ad997cab7b392a843 php-odbc-4.3.2-37.ent.i386.rpm 490c79e14227457c8c935ed5aa4ba26e php-pgsql-4.3.2-37.ent.i386.rpm x86_64: 3098d16918a9971392dbc947738896b8 php-4.3.2-37.ent.x86_64.rpm 268878518411eff6a308ce42b3389229 php-debuginfo-4.3.2-37.ent.x86_64.rpm 8b1b6199c734b64cf49b0bcee67f067a php-devel-4.3.2-37.ent.x86_64.rpm 77eb040700cc8e67b6dc3a419addd656 php-imap-4.3.2-37.ent.x86_64.rpm f0cad87123de9eded5bf22206e701ba4 php-ldap-4.3.2-37.ent.x86_64.rpm 35291e8b5ff5c0e4e6b6e19dc89566d4 php-mysql-4.3.2-37.ent.x86_64.rpm da41b9d551747ed2c3e5174a65b0a943 php-odbc-4.3.2-37.ent.x86_64.rpm 59b82440c11498744f04d72b864c5587 php-pgsql-4.3.2-37.ent.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/php-4.3.2-37.ent.src.rpm bf046ac10e41ce26a7a0189653b57acd php-4.3.2-37.ent.src.rpm i386: ed7499077777ccac9e77546405249ee1 php-4.3.2-37.ent.i386.rpm 64fc7d48d0fa05b9047606a485eb29d3 php-debuginfo-4.3.2-37.ent.i386.rpm 347be6ab3592cb744da1a909d0458137 php-devel-4.3.2-37.ent.i386.rpm a764a53a4bf366694583ec0b57afcc31 php-imap-4.3.2-37.ent.i386.rpm 07682e90cd1fe24c52bdb8131631ecb2 php-ldap-4.3.2-37.ent.i386.rpm 517a16f6dc384a6df3b4915e1c6583d9 php-mysql-4.3.2-37.ent.i386.rpm 128813456803652ad997cab7b392a843 php-odbc-4.3.2-37.ent.i386.rpm 490c79e14227457c8c935ed5aa4ba26e php-pgsql-4.3.2-37.ent.i386.rpm ia64: 648b8800529e14543fb85ac7a5fde75d php-4.3.2-37.ent.ia64.rpm 03e84ae67955dccface5c57411b77279 php-debuginfo-4.3.2-37.ent.ia64.rpm 92821b6e8da55dea0c870deee826a3f5 php-devel-4.3.2-37.ent.ia64.rpm f5815a8af4fd4df9a3fd5c184c54910d php-imap-4.3.2-37.ent.ia64.rpm e7e62ea263c31ca820f5369070a05952 php-ldap-4.3.2-37.ent.ia64.rpm 50ee0cfa37cb40f857ac5825b3be56da php-mysql-4.3.2-37.ent.ia64.rpm 1e2b2711a93335932e9e859cbad6f162 php-odbc-4.3.2-37.ent.ia64.rpm dcde09bfb2ac89ac9fba9b2b06361e3a php-pgsql-4.3.2-37.ent.ia64.rpm x86_64: 3098d16918a9971392dbc947738896b8 php-4.3.2-37.ent.x86_64.rpm 268878518411eff6a308ce42b3389229 php-debuginfo-4.3.2-37.ent.x86_64.rpm 8b1b6199c734b64cf49b0bcee67f067a php-devel-4.3.2-37.ent.x86_64.rpm 77eb040700cc8e67b6dc3a419addd656 php-imap-4.3.2-37.ent.x86_64.rpm f0cad87123de9eded5bf22206e701ba4 php-ldap-4.3.2-37.ent.x86_64.rpm 35291e8b5ff5c0e4e6b6e19dc89566d4 php-mysql-4.3.2-37.ent.x86_64.rpm da41b9d551747ed2c3e5174a65b0a943 php-odbc-4.3.2-37.ent.x86_64.rpm 59b82440c11498744f04d72b864c5587 php-pgsql-4.3.2-37.ent.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/php-4.3.2-37.ent.src.rpm bf046ac10e41ce26a7a0189653b57acd php-4.3.2-37.ent.src.rpm i386: ed7499077777ccac9e77546405249ee1 php-4.3.2-37.ent.i386.rpm 64fc7d48d0fa05b9047606a485eb29d3 php-debuginfo-4.3.2-37.ent.i386.rpm 347be6ab3592cb744da1a909d0458137 php-devel-4.3.2-37.ent.i386.rpm a764a53a4bf366694583ec0b57afcc31 php-imap-4.3.2-37.ent.i386.rpm 07682e90cd1fe24c52bdb8131631ecb2 php-ldap-4.3.2-37.ent.i386.rpm 517a16f6dc384a6df3b4915e1c6583d9 php-mysql-4.3.2-37.ent.i386.rpm 128813456803652ad997cab7b392a843 php-odbc-4.3.2-37.ent.i386.rpm 490c79e14227457c8c935ed5aa4ba26e php-pgsql-4.3.2-37.ent.i386.rpm ia64: 648b8800529e14543fb85ac7a5fde75d php-4.3.2-37.ent.ia64.rpm 03e84ae67955dccface5c57411b77279 php-debuginfo-4.3.2-37.ent.ia64.rpm 92821b6e8da55dea0c870deee826a3f5 php-devel-4.3.2-37.ent.ia64.rpm f5815a8af4fd4df9a3fd5c184c54910d php-imap-4.3.2-37.ent.ia64.rpm e7e62ea263c31ca820f5369070a05952 php-ldap-4.3.2-37.ent.ia64.rpm 50ee0cfa37cb40f857ac5825b3be56da php-mysql-4.3.2-37.ent.ia64.rpm 1e2b2711a93335932e9e859cbad6f162 php-odbc-4.3.2-37.ent.ia64.rpm dcde09bfb2ac89ac9fba9b2b06361e3a php-pgsql-4.3.2-37.ent.ia64.rpm x86_64: 3098d16918a9971392dbc947738896b8 php-4.3.2-37.ent.x86_64.rpm 268878518411eff6a308ce42b3389229 php-debuginfo-4.3.2-37.ent.x86_64.rpm 8b1b6199c734b64cf49b0bcee67f067a php-devel-4.3.2-37.ent.x86_64.rpm 77eb040700cc8e67b6dc3a419addd656 php-imap-4.3.2-37.ent.x86_64.rpm f0cad87123de9eded5bf22206e701ba4 php-ldap-4.3.2-37.ent.x86_64.rpm 35291e8b5ff5c0e4e6b6e19dc89566d4 php-mysql-4.3.2-37.ent.x86_64.rpm da41b9d551747ed2c3e5174a65b0a943 php-odbc-4.3.2-37.ent.x86_64.rpm 59b82440c11498744f04d72b864c5587 php-pgsql-4.3.2-37.ent.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/php-4.3.9-3.22.src.rpm 7b7a99ed1157fa51afe3cd8f8c10ec0b php-4.3.9-3.22.src.rpm i386: 0067885b1a2c622dab0b2659ac39189d php-4.3.9-3.22.i386.rpm 335bf261ace13a067b606536e83bef5b php-debuginfo-4.3.9-3.22.i386.rpm f4007c3c7c5804d2f8b2966549f45485 php-devel-4.3.9-3.22.i386.rpm 6099d76e98d764484adb7d2535f24f37 php-domxml-4.3.9-3.22.i386.rpm b06ea4791691f2c80e17d9386c19c3d7 php-gd-4.3.9-3.22.i386.rpm 2631dbea1fb7c74a212edf01c32dbdb8 php-imap-4.3.9-3.22.i386.rpm 8c4db990b3d058505057e240081edabe php-ldap-4.3.9-3.22.i386.rpm b9b101f48f3e0fc2355d77ea11a31fb7 php-mbstring-4.3.9-3.22.i386.rpm ea2fe798ece3915e18836fb05649167a php-mysql-4.3.9-3.22.i386.rpm 38f99ef0585340bcfbf50571e4abd146 php-ncurses-4.3.9-3.22.i386.rpm a16182cc71c61a40d7125fc59614a94d php-odbc-4.3.9-3.22.i386.rpm fd51e9a92d2cbf334128c7a5965d8dfe php-pear-4.3.9-3.22.i386.rpm e6c866ca18d53b5880182a27c0f0f3c1 php-pgsql-4.3.9-3.22.i386.rpm 96e4a0b41c3851653537be4651acb181 php-snmp-4.3.9-3.22.i386.rpm df071781b4905745f8005306809215ea php-xmlrpc-4.3.9-3.22.i386.rpm ia64: e03e95b1b231c7d1041470df1cb20b88 php-4.3.9-3.22.ia64.rpm 9ee07a9a2d6517518b8a8a68e917f398 php-debuginfo-4.3.9-3.22.ia64.rpm 21f6917b4f11e4fd1444b8c0565d3464 php-devel-4.3.9-3.22.ia64.rpm f4ddc27eb23f1fdbf94147374ba26a5b php-domxml-4.3.9-3.22.ia64.rpm ae3c91e4d89c32d9e1ea0a9050dcd071 php-gd-4.3.9-3.22.ia64.rpm 5213e2497c3207dc818397e4eed744ed php-imap-4.3.9-3.22.ia64.rpm 4716f9efb52d99adedd9307a9e72d207 php-ldap-4.3.9-3.22.ia64.rpm a417bdc307612127a59707be62468e84 php-mbstring-4.3.9-3.22.ia64.rpm 7e031129d7e5bb5c96d19348ed798e48 php-mysql-4.3.9-3.22.ia64.rpm 29c881c335dc851988e2836b0c0716ed php-ncurses-4.3.9-3.22.ia64.rpm ac60d1f87b072811484d1ac6247d63e3 php-odbc-4.3.9-3.22.ia64.rpm 8d211933c1609b1ef71e83a1cbf39bcc php-pear-4.3.9-3.22.ia64.rpm 85cf38ce549350f197648738dc27e8ac php-pgsql-4.3.9-3.22.ia64.rpm a6bbeae52e324ddb3358f65e75c65205 php-snmp-4.3.9-3.22.ia64.rpm 5f139b51a5abf46d6d6d84029f81b6ab php-xmlrpc-4.3.9-3.22.ia64.rpm ppc: 4a6f50b1976da77625ff49148dfe36c9 php-4.3.9-3.22.ppc.rpm b0ac4bc411f2851bd29aba410385f89a php-debuginfo-4.3.9-3.22.ppc.rpm 6a014883141733553e29db04763a003f php-devel-4.3.9-3.22.ppc.rpm ab4305b7e93406579da1cd4b088b07b1 php-domxml-4.3.9-3.22.ppc.rpm 4dcfec3009bf8d49f576caa3d1df7774 php-gd-4.3.9-3.22.ppc.rpm bbc85fffcaa160bc4baf59629083a635 php-imap-4.3.9-3.22.ppc.rpm 5a4bfad6607cb7575cd707bf33632c11 php-ldap-4.3.9-3.22.ppc.rpm 22db575cd6fa588e404444e1c6b634a1 php-mbstring-4.3.9-3.22.ppc.rpm a5f6fa585f9effbbb3462c162b6384f1 php-mysql-4.3.9-3.22.ppc.rpm 0515cc0ce832ba525f9db6c6655f5249 php-ncurses-4.3.9-3.22.ppc.rpm c910f7d713d59048b8f09ffd0a2d00b5 php-odbc-4.3.9-3.22.ppc.rpm 15a5ab877d293f455bc24f8fe38295e0 php-pear-4.3.9-3.22.ppc.rpm 6c6b6ce80a13a26576ac28bc6089e3cc php-pgsql-4.3.9-3.22.ppc.rpm 1d8381e7ad0fd3fc08a6f9854b78fb24 php-snmp-4.3.9-3.22.ppc.rpm fbb219e9070995cd0227e22dd5a3b201 php-xmlrpc-4.3.9-3.22.ppc.rpm s390: 3e890a00f021dd446a901da6ffbd0477 php-4.3.9-3.22.s390.rpm e967ba7bf8b3651e7c647a92a605c28b php-debuginfo-4.3.9-3.22.s390.rpm 5776efcef1ba11f6a233cc5535e1e7e7 php-devel-4.3.9-3.22.s390.rpm d6e2d1623b3ed8bb12c9c944f2057492 php-domxml-4.3.9-3.22.s390.rpm 442d02226344d23b33eba2b2945857ef php-gd-4.3.9-3.22.s390.rpm 3140343b3520cbc63cb02794a24da729 php-imap-4.3.9-3.22.s390.rpm 0d356ed6063e17dc4db3aad86d27e4f3 php-ldap-4.3.9-3.22.s390.rpm c8f9699f1ce731fbd9450afbd007277b php-mbstring-4.3.9-3.22.s390.rpm 5924e726c40e193b49a9aa0df0f9a911 php-mysql-4.3.9-3.22.s390.rpm a24057258cbd22f170bd95d78636a3c4 php-ncurses-4.3.9-3.22.s390.rpm c43ae48eaff59d62ffac6f24af7c6e89 php-odbc-4.3.9-3.22.s390.rpm 98b3f14a59ef5f93a82316a8e061f0b3 php-pear-4.3.9-3.22.s390.rpm 56988e2b64fe1214926699a1b1f4e584 php-pgsql-4.3.9-3.22.s390.rpm 8f6417cf96ae37b94c7fad0bd0ed3e2e php-snmp-4.3.9-3.22.s390.rpm 0d4824edceac2aa36b721d7aaf9ca48b php-xmlrpc-4.3.9-3.22.s390.rpm s390x: 1e54f5447beeebf543427fd1b55cd198 php-4.3.9-3.22.s390x.rpm 3edbc6843d5f6f7a09824f785c2cba59 php-debuginfo-4.3.9-3.22.s390x.rpm 0d8fed7a3758cdb0564ed92b290c7cae php-devel-4.3.9-3.22.s390x.rpm 3e5b6d634bef2ad8c686b9655242644f php-domxml-4.3.9-3.22.s390x.rpm e0bd9c3c71c79f43ed05e26391bee5ef php-gd-4.3.9-3.22.s390x.rpm 213f8189d2027661ab668f35dc49cd0d php-imap-4.3.9-3.22.s390x.rpm 48c47b65a3e79cfc6a03609055ce4812 php-ldap-4.3.9-3.22.s390x.rpm df0cf0dcd6b0c8740798edfb808d9aa6 php-mbstring-4.3.9-3.22.s390x.rpm 02710ab88443b4872d71f38008772425 php-mysql-4.3.9-3.22.s390x.rpm 666e3a3a7769ab8a6de4e3d94a237af7 php-ncurses-4.3.9-3.22.s390x.rpm f4b7f3dda711296ddb6e1edd18abb677 php-odbc-4.3.9-3.22.s390x.rpm 40066e8b29596dac8d3ad84935bdb79b php-pear-4.3.9-3.22.s390x.rpm 6ccde97ec8544fea4945caa02e61ba5e php-pgsql-4.3.9-3.22.s390x.rpm ad927ecd2784867b133afb1ae49ee0b2 php-snmp-4.3.9-3.22.s390x.rpm d56db24cc50a1bb6b86d66ef6c040932 php-xmlrpc-4.3.9-3.22.s390x.rpm x86_64: 085471928ff4dbde6ba7b40b06635062 php-4.3.9-3.22.x86_64.rpm 2e7e648b725dd1ece1a116852aceb22d php-debuginfo-4.3.9-3.22.x86_64.rpm cd02436bba3b0512a0cc1959997c4a83 php-devel-4.3.9-3.22.x86_64.rpm 7a3c76b8bd6d84055a4eb82c7741d56c php-domxml-4.3.9-3.22.x86_64.rpm 9e65d19b9b73cd9d64bcfb5b4b474334 php-gd-4.3.9-3.22.x86_64.rpm 7e5e8ed005e8594377ccbd0832154583 php-imap-4.3.9-3.22.x86_64.rpm 95c97da74a3c1ee347001e6e7ec33d01 php-ldap-4.3.9-3.22.x86_64.rpm 28164b292394b9c2e91d836dccddb429 php-mbstring-4.3.9-3.22.x86_64.rpm 1934965b64a54e0d9a37251af02b3f31 php-mysql-4.3.9-3.22.x86_64.rpm 8930d4801fceb82cf468a2c6e121093a php-ncurses-4.3.9-3.22.x86_64.rpm 97d71db6e2790f50f7289fa7ea181195 php-odbc-4.3.9-3.22.x86_64.rpm e702b0f8f0a2c5bcec3cfb5d180ffeb5 php-pear-4.3.9-3.22.x86_64.rpm 194cee18d6d752e25e4db85e446717dc php-pgsql-4.3.9-3.22.x86_64.rpm e650c74b27ac987be8789fdcc6434a59 php-snmp-4.3.9-3.22.x86_64.rpm 5f5f07ad2c0c24a980bd040d61c36dc1 php-xmlrpc-4.3.9-3.22.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/php-4.3.9-3.22.src.rpm 7b7a99ed1157fa51afe3cd8f8c10ec0b php-4.3.9-3.22.src.rpm i386: 0067885b1a2c622dab0b2659ac39189d php-4.3.9-3.22.i386.rpm 335bf261ace13a067b606536e83bef5b php-debuginfo-4.3.9-3.22.i386.rpm f4007c3c7c5804d2f8b2966549f45485 php-devel-4.3.9-3.22.i386.rpm 6099d76e98d764484adb7d2535f24f37 php-domxml-4.3.9-3.22.i386.rpm b06ea4791691f2c80e17d9386c19c3d7 php-gd-4.3.9-3.22.i386.rpm 2631dbea1fb7c74a212edf01c32dbdb8 php-imap-4.3.9-3.22.i386.rpm 8c4db990b3d058505057e240081edabe php-ldap-4.3.9-3.22.i386.rpm b9b101f48f3e0fc2355d77ea11a31fb7 php-mbstring-4.3.9-3.22.i386.rpm ea2fe798ece3915e18836fb05649167a php-mysql-4.3.9-3.22.i386.rpm 38f99ef0585340bcfbf50571e4abd146 php-ncurses-4.3.9-3.22.i386.rpm a16182cc71c61a40d7125fc59614a94d php-odbc-4.3.9-3.22.i386.rpm fd51e9a92d2cbf334128c7a5965d8dfe php-pear-4.3.9-3.22.i386.rpm e6c866ca18d53b5880182a27c0f0f3c1 php-pgsql-4.3.9-3.22.i386.rpm 96e4a0b41c3851653537be4651acb181 php-snmp-4.3.9-3.22.i386.rpm df071781b4905745f8005306809215ea php-xmlrpc-4.3.9-3.22.i386.rpm x86_64: 085471928ff4dbde6ba7b40b06635062 php-4.3.9-3.22.x86_64.rpm 2e7e648b725dd1ece1a116852aceb22d php-debuginfo-4.3.9-3.22.x86_64.rpm cd02436bba3b0512a0cc1959997c4a83 php-devel-4.3.9-3.22.x86_64.rpm 7a3c76b8bd6d84055a4eb82c7741d56c php-domxml-4.3.9-3.22.x86_64.rpm 9e65d19b9b73cd9d64bcfb5b4b474334 php-gd-4.3.9-3.22.x86_64.rpm 7e5e8ed005e8594377ccbd0832154583 php-imap-4.3.9-3.22.x86_64.rpm 95c97da74a3c1ee347001e6e7ec33d01 php-ldap-4.3.9-3.22.x86_64.rpm 28164b292394b9c2e91d836dccddb429 php-mbstring-4.3.9-3.22.x86_64.rpm 1934965b64a54e0d9a37251af02b3f31 php-mysql-4.3.9-3.22.x86_64.rpm 8930d4801fceb82cf468a2c6e121093a php-ncurses-4.3.9-3.22.x86_64.rpm 97d71db6e2790f50f7289fa7ea181195 php-odbc-4.3.9-3.22.x86_64.rpm e702b0f8f0a2c5bcec3cfb5d180ffeb5 php-pear-4.3.9-3.22.x86_64.rpm 194cee18d6d752e25e4db85e446717dc php-pgsql-4.3.9-3.22.x86_64.rpm e650c74b27ac987be8789fdcc6434a59 php-snmp-4.3.9-3.22.x86_64.rpm 5f5f07ad2c0c24a980bd040d61c36dc1 php-xmlrpc-4.3.9-3.22.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/php-4.3.9-3.22.src.rpm 7b7a99ed1157fa51afe3cd8f8c10ec0b php-4.3.9-3.22.src.rpm i386: 0067885b1a2c622dab0b2659ac39189d php-4.3.9-3.22.i386.rpm 335bf261ace13a067b606536e83bef5b php-debuginfo-4.3.9-3.22.i386.rpm f4007c3c7c5804d2f8b2966549f45485 php-devel-4.3.9-3.22.i386.rpm 6099d76e98d764484adb7d2535f24f37 php-domxml-4.3.9-3.22.i386.rpm b06ea4791691f2c80e17d9386c19c3d7 php-gd-4.3.9-3.22.i386.rpm 2631dbea1fb7c74a212edf01c32dbdb8 php-imap-4.3.9-3.22.i386.rpm 8c4db990b3d058505057e240081edabe php-ldap-4.3.9-3.22.i386.rpm b9b101f48f3e0fc2355d77ea11a31fb7 php-mbstring-4.3.9-3.22.i386.rpm ea2fe798ece3915e18836fb05649167a php-mysql-4.3.9-3.22.i386.rpm 38f99ef0585340bcfbf50571e4abd146 php-ncurses-4.3.9-3.22.i386.rpm a16182cc71c61a40d7125fc59614a94d php-odbc-4.3.9-3.22.i386.rpm fd51e9a92d2cbf334128c7a5965d8dfe php-pear-4.3.9-3.22.i386.rpm e6c866ca18d53b5880182a27c0f0f3c1 php-pgsql-4.3.9-3.22.i386.rpm 96e4a0b41c3851653537be4651acb181 php-snmp-4.3.9-3.22.i386.rpm df071781b4905745f8005306809215ea php-xmlrpc-4.3.9-3.22.i386.rpm ia64: e03e95b1b231c7d1041470df1cb20b88 php-4.3.9-3.22.ia64.rpm 9ee07a9a2d6517518b8a8a68e917f398 php-debuginfo-4.3.9-3.22.ia64.rpm 21f6917b4f11e4fd1444b8c0565d3464 php-devel-4.3.9-3.22.ia64.rpm f4ddc27eb23f1fdbf94147374ba26a5b php-domxml-4.3.9-3.22.ia64.rpm ae3c91e4d89c32d9e1ea0a9050dcd071 php-gd-4.3.9-3.22.ia64.rpm 5213e2497c3207dc818397e4eed744ed php-imap-4.3.9-3.22.ia64.rpm 4716f9efb52d99adedd9307a9e72d207 php-ldap-4.3.9-3.22.ia64.rpm a417bdc307612127a59707be62468e84 php-mbstring-4.3.9-3.22.ia64.rpm 7e031129d7e5bb5c96d19348ed798e48 php-mysql-4.3.9-3.22.ia64.rpm 29c881c335dc851988e2836b0c0716ed php-ncurses-4.3.9-3.22.ia64.rpm ac60d1f87b072811484d1ac6247d63e3 php-odbc-4.3.9-3.22.ia64.rpm 8d211933c1609b1ef71e83a1cbf39bcc php-pear-4.3.9-3.22.ia64.rpm 85cf38ce549350f197648738dc27e8ac php-pgsql-4.3.9-3.22.ia64.rpm a6bbeae52e324ddb3358f65e75c65205 php-snmp-4.3.9-3.22.ia64.rpm 5f139b51a5abf46d6d6d84029f81b6ab php-xmlrpc-4.3.9-3.22.ia64.rpm x86_64: 085471928ff4dbde6ba7b40b06635062 php-4.3.9-3.22.x86_64.rpm 2e7e648b725dd1ece1a116852aceb22d php-debuginfo-4.3.9-3.22.x86_64.rpm cd02436bba3b0512a0cc1959997c4a83 php-devel-4.3.9-3.22.x86_64.rpm 7a3c76b8bd6d84055a4eb82c7741d56c php-domxml-4.3.9-3.22.x86_64.rpm 9e65d19b9b73cd9d64bcfb5b4b474334 php-gd-4.3.9-3.22.x86_64.rpm 7e5e8ed005e8594377ccbd0832154583 php-imap-4.3.9-3.22.x86_64.rpm 95c97da74a3c1ee347001e6e7ec33d01 php-ldap-4.3.9-3.22.x86_64.rpm 28164b292394b9c2e91d836dccddb429 php-mbstring-4.3.9-3.22.x86_64.rpm 1934965b64a54e0d9a37251af02b3f31 php-mysql-4.3.9-3.22.x86_64.rpm 8930d4801fceb82cf468a2c6e121093a php-ncurses-4.3.9-3.22.x86_64.rpm 97d71db6e2790f50f7289fa7ea181195 php-odbc-4.3.9-3.22.x86_64.rpm e702b0f8f0a2c5bcec3cfb5d180ffeb5 php-pear-4.3.9-3.22.x86_64.rpm 194cee18d6d752e25e4db85e446717dc php-pgsql-4.3.9-3.22.x86_64.rpm e650c74b27ac987be8789fdcc6434a59 php-snmp-4.3.9-3.22.x86_64.rpm 5f5f07ad2c0c24a980bd040d61c36dc1 php-xmlrpc-4.3.9-3.22.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/php-4.3.9-3.22.src.rpm 7b7a99ed1157fa51afe3cd8f8c10ec0b php-4.3.9-3.22.src.rpm i386: 0067885b1a2c622dab0b2659ac39189d php-4.3.9-3.22.i386.rpm 335bf261ace13a067b606536e83bef5b php-debuginfo-4.3.9-3.22.i386.rpm f4007c3c7c5804d2f8b2966549f45485 php-devel-4.3.9-3.22.i386.rpm 6099d76e98d764484adb7d2535f24f37 php-domxml-4.3.9-3.22.i386.rpm b06ea4791691f2c80e17d9386c19c3d7 php-gd-4.3.9-3.22.i386.rpm 2631dbea1fb7c74a212edf01c32dbdb8 php-imap-4.3.9-3.22.i386.rpm 8c4db990b3d058505057e240081edabe php-ldap-4.3.9-3.22.i386.rpm b9b101f48f3e0fc2355d77ea11a31fb7 php-mbstring-4.3.9-3.22.i386.rpm ea2fe798ece3915e18836fb05649167a php-mysql-4.3.9-3.22.i386.rpm 38f99ef0585340bcfbf50571e4abd146 php-ncurses-4.3.9-3.22.i386.rpm a16182cc71c61a40d7125fc59614a94d php-odbc-4.3.9-3.22.i386.rpm fd51e9a92d2cbf334128c7a5965d8dfe php-pear-4.3.9-3.22.i386.rpm e6c866ca18d53b5880182a27c0f0f3c1 php-pgsql-4.3.9-3.22.i386.rpm 96e4a0b41c3851653537be4651acb181 php-snmp-4.3.9-3.22.i386.rpm df071781b4905745f8005306809215ea php-xmlrpc-4.3.9-3.22.i386.rpm ia64: e03e95b1b231c7d1041470df1cb20b88 php-4.3.9-3.22.ia64.rpm 9ee07a9a2d6517518b8a8a68e917f398 php-debuginfo-4.3.9-3.22.ia64.rpm 21f6917b4f11e4fd1444b8c0565d3464 php-devel-4.3.9-3.22.ia64.rpm f4ddc27eb23f1fdbf94147374ba26a5b php-domxml-4.3.9-3.22.ia64.rpm ae3c91e4d89c32d9e1ea0a9050dcd071 php-gd-4.3.9-3.22.ia64.rpm 5213e2497c3207dc818397e4eed744ed php-imap-4.3.9-3.22.ia64.rpm 4716f9efb52d99adedd9307a9e72d207 php-ldap-4.3.9-3.22.ia64.rpm a417bdc307612127a59707be62468e84 php-mbstring-4.3.9-3.22.ia64.rpm 7e031129d7e5bb5c96d19348ed798e48 php-mysql-4.3.9-3.22.ia64.rpm 29c881c335dc851988e2836b0c0716ed php-ncurses-4.3.9-3.22.ia64.rpm ac60d1f87b072811484d1ac6247d63e3 php-odbc-4.3.9-3.22.ia64.rpm 8d211933c1609b1ef71e83a1cbf39bcc php-pear-4.3.9-3.22.ia64.rpm 85cf38ce549350f197648738dc27e8ac php-pgsql-4.3.9-3.22.ia64.rpm a6bbeae52e324ddb3358f65e75c65205 php-snmp-4.3.9-3.22.ia64.rpm 5f139b51a5abf46d6d6d84029f81b6ab php-xmlrpc-4.3.9-3.22.ia64.rpm x86_64: 085471928ff4dbde6ba7b40b06635062 php-4.3.9-3.22.x86_64.rpm 2e7e648b725dd1ece1a116852aceb22d php-debuginfo-4.3.9-3.22.x86_64.rpm cd02436bba3b0512a0cc1959997c4a83 php-devel-4.3.9-3.22.x86_64.rpm 7a3c76b8bd6d84055a4eb82c7741d56c php-domxml-4.3.9-3.22.x86_64.rpm 9e65d19b9b73cd9d64bcfb5b4b474334 php-gd-4.3.9-3.22.x86_64.rpm 7e5e8ed005e8594377ccbd0832154583 php-imap-4.3.9-3.22.x86_64.rpm 95c97da74a3c1ee347001e6e7ec33d01 php-ldap-4.3.9-3.22.x86_64.rpm 28164b292394b9c2e91d836dccddb429 php-mbstring-4.3.9-3.22.x86_64.rpm 1934965b64a54e0d9a37251af02b3f31 php-mysql-4.3.9-3.22.x86_64.rpm 8930d4801fceb82cf468a2c6e121093a php-ncurses-4.3.9-3.22.x86_64.rpm 97d71db6e2790f50f7289fa7ea181195 php-odbc-4.3.9-3.22.x86_64.rpm e702b0f8f0a2c5bcec3cfb5d180ffeb5 php-pear-4.3.9-3.22.x86_64.rpm 194cee18d6d752e25e4db85e446717dc php-pgsql-4.3.9-3.22.x86_64.rpm e650c74b27ac987be8789fdcc6434a59 php-snmp-4.3.9-3.22.x86_64.rpm 5f5f07ad2c0c24a980bd040d61c36dc1 php-xmlrpc-4.3.9-3.22.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465 http://www.hardened-php.net/advisory_132006.138.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFT8R/XlSAg2UNWIIRAhJeAJ93iddSdVNfIbhYjoO8QiffRDeowQCfRpKM R9dkVKXvKlsChPrU5qy8OnY= =fGdY -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 8 08:51:47 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Nov 2006 03:51:47 -0500 Subject: [RHSA-2006:0733-02] Critical: firefox security update Message-ID: <200611080851.kA88pllK005665@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2006:0733-02 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0733.html Issue date: 2006-11-08 Updated on: 2006-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5462 CVE-2006-5463 CVE-2006-5464 CVE-2006-5747 CVE-2006-5748 - --------------------------------------------------------------------- 1. Summary: Updated firefox packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Firefox is an open source Web browser. Several flaws were found in the way Firefox processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause Firefox to crash or execute arbitrary code as the user running Firefox. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748) Several flaws were found in the way Firefox renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running Firefox. (CVE-2006-5464) A flaw was found in the way Firefox verifies RSA signatures. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. Firefox as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which be incorrectly trusted when their site was visited by a victim. This flaw was previously thought to be fixed in Firefox 1.5.0.7, however Ulrich Kuehn discovered the fix was incomplete (CVE-2006-5462) Users of Firefox are advised to upgrade to these erratum packages, which contain Firefox version 1.5.0.8 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 214445 - CVE-2006-5462 Multiple firefox vulnerabilities (CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/firefox-1.5.0.8-0.1.el4.src.rpm f0dac1df2a2ac6439b2cf927176866bb firefox-1.5.0.8-0.1.el4.src.rpm i386: 0509ce2a279ea71961b954792de1876d firefox-1.5.0.8-0.1.el4.i386.rpm e16db8054030ff2073e0f59c55bea9f6 firefox-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 2a0eb68c8a91c9ca668ab1335430b8aa firefox-1.5.0.8-0.1.el4.ia64.rpm 8e4c87d97187fd51e5cd3af7af595a19 firefox-debuginfo-1.5.0.8-0.1.el4.ia64.rpm ppc: 6b4ecf71cabb96a9d81d1b39f92c6385 firefox-1.5.0.8-0.1.el4.ppc.rpm ac5f83e48acf1b5b73720fbc1e3de729 firefox-debuginfo-1.5.0.8-0.1.el4.ppc.rpm s390: 27dce417a9b5537ca2d6c92fa35c06ad firefox-1.5.0.8-0.1.el4.s390.rpm 7559b7ebc6475555fa7b3dcee6140d79 firefox-debuginfo-1.5.0.8-0.1.el4.s390.rpm s390x: 77957a547a7dfb3f49f66ed719c7bc6f firefox-1.5.0.8-0.1.el4.s390x.rpm 292c86212b70e4447f484946d4c6a9a9 firefox-debuginfo-1.5.0.8-0.1.el4.s390x.rpm x86_64: 0ca1912d402b4324c1d5a405ed9af70a firefox-1.5.0.8-0.1.el4.x86_64.rpm 7cf5067f37d73bedeb0e4d328a773322 firefox-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/firefox-1.5.0.8-0.1.el4.src.rpm f0dac1df2a2ac6439b2cf927176866bb firefox-1.5.0.8-0.1.el4.src.rpm i386: 0509ce2a279ea71961b954792de1876d firefox-1.5.0.8-0.1.el4.i386.rpm e16db8054030ff2073e0f59c55bea9f6 firefox-debuginfo-1.5.0.8-0.1.el4.i386.rpm x86_64: 0ca1912d402b4324c1d5a405ed9af70a firefox-1.5.0.8-0.1.el4.x86_64.rpm 7cf5067f37d73bedeb0e4d328a773322 firefox-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/firefox-1.5.0.8-0.1.el4.src.rpm f0dac1df2a2ac6439b2cf927176866bb firefox-1.5.0.8-0.1.el4.src.rpm i386: 0509ce2a279ea71961b954792de1876d firefox-1.5.0.8-0.1.el4.i386.rpm e16db8054030ff2073e0f59c55bea9f6 firefox-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 2a0eb68c8a91c9ca668ab1335430b8aa firefox-1.5.0.8-0.1.el4.ia64.rpm 8e4c87d97187fd51e5cd3af7af595a19 firefox-debuginfo-1.5.0.8-0.1.el4.ia64.rpm x86_64: 0ca1912d402b4324c1d5a405ed9af70a firefox-1.5.0.8-0.1.el4.x86_64.rpm 7cf5067f37d73bedeb0e4d328a773322 firefox-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/firefox-1.5.0.8-0.1.el4.src.rpm f0dac1df2a2ac6439b2cf927176866bb firefox-1.5.0.8-0.1.el4.src.rpm i386: 0509ce2a279ea71961b954792de1876d firefox-1.5.0.8-0.1.el4.i386.rpm e16db8054030ff2073e0f59c55bea9f6 firefox-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 2a0eb68c8a91c9ca668ab1335430b8aa firefox-1.5.0.8-0.1.el4.ia64.rpm 8e4c87d97187fd51e5cd3af7af595a19 firefox-debuginfo-1.5.0.8-0.1.el4.ia64.rpm x86_64: 0ca1912d402b4324c1d5a405ed9af70a firefox-1.5.0.8-0.1.el4.x86_64.rpm 7cf5067f37d73bedeb0e4d328a773322 firefox-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFUZqgXlSAg2UNWIIRAl0PAJ42CF5q2iLUc+Ua7aaD8Hmb4eodgQCZAcUM CqHzEoCW9fgxnyBM7ZgcPLg= =0cUl -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 8 09:48:59 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Nov 2006 04:48:59 -0500 Subject: [RHSA-2006:0734-01] Critical: seamonkey security update Message-ID: <200611080948.kA89mxqc022779@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: seamonkey security update Advisory ID: RHSA-2006:0734-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0734.html Issue date: 2006-11-08 Updated on: 2006-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5462 CVE-2006-5463 CVE-2006-5464 CVE-2006-5747 CVE-2006-5748 - --------------------------------------------------------------------- 1. Summary: Updated seamonkey packages that fix several security bugs are now available for Red Hat Enterprise Linux 2.1, 3, and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: SeaMonkey is an open source Web browser, advanced email and newsgroup client, IRC chat client, and HTML editor. Several flaws were found in the way SeaMonkey processes certain malformed Javascript code. A malicious web page could cause the execution of Javascript code in such a way that could cause SeaMonkey to crash or execute arbitrary code as the user running SeaMonkey. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748) Several flaws were found in the way SeaMonkey renders web pages. A malicious web page could cause the browser to crash or possibly execute arbitrary code as the user running SeaMonkey. (CVE-2006-5464) A flaw was found in the way SeaMonkey verifies RSA signatures. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. SeaMonkey as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which be incorrectly trusted when their site was visited by a victim. This flaw was previously thought to be fixed in SeaMonkey 1.0.5, however Ulrich Kuehn discovered the fix was incomplete (CVE-2006-5462) Users of SeaMonkey are advised to upgrade to these erratum packages, which contains SeaMonkey version 1.0.6 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 214447 - CVE-2006-5462 Multiple seamonkey vulnerabilities (CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748) 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/seamonkey-1.0.6-0.1.el2.src.rpm 70eb479ad436bb82e7e15a7b1b49e054 seamonkey-1.0.6-0.1.el2.src.rpm i386: c01ef57f0ff28667337f64d2d36415cf seamonkey-1.0.6-0.1.el2.i386.rpm baab959f19a3b405cc743c2cd1dc3ec0 seamonkey-chat-1.0.6-0.1.el2.i386.rpm db67f7079da4a6dac8da865ce60fa56b seamonkey-devel-1.0.6-0.1.el2.i386.rpm d2ab7b4dfd1da40c62f9068d89156b45 seamonkey-dom-inspector-1.0.6-0.1.el2.i386.rpm 174918966041dc32da9f0ea73e523503 seamonkey-js-debugger-1.0.6-0.1.el2.i386.rpm 65124751f70a5704b04886fefa11988c seamonkey-mail-1.0.6-0.1.el2.i386.rpm d1b870ab9237e0dd9cfe5166fdfdac8a seamonkey-nspr-1.0.6-0.1.el2.i386.rpm 895e2ace4fa6cd8bf5064fd2e4926351 seamonkey-nspr-devel-1.0.6-0.1.el2.i386.rpm 82a975c0a32a4d26afd96a0ad9c1b966 seamonkey-nss-1.0.6-0.1.el2.i386.rpm 9a5985a9ee73879cfdf974fd110071b9 seamonkey-nss-devel-1.0.6-0.1.el2.i386.rpm ia64: a2819cd488d3349a6a14e0ca5c727ce3 seamonkey-1.0.6-0.1.el2.ia64.rpm deb1723d39abe08d561de2ccf6c1e19f seamonkey-chat-1.0.6-0.1.el2.ia64.rpm a022dc2595e44f4e2b1c2babfc46b7fc seamonkey-devel-1.0.6-0.1.el2.ia64.rpm 9963a7f3e508c83d450e845414fb33a9 seamonkey-dom-inspector-1.0.6-0.1.el2.ia64.rpm aa7a8dda0b6be6db3fc1cf1ed5280a0e seamonkey-js-debugger-1.0.6-0.1.el2.ia64.rpm 0973140763cf7185faa79a75b94ae0a9 seamonkey-mail-1.0.6-0.1.el2.ia64.rpm 4d6db192b854f47180ae0069c1411b47 seamonkey-nspr-1.0.6-0.1.el2.ia64.rpm 37b3548dd349915fdaf697265e967679 seamonkey-nspr-devel-1.0.6-0.1.el2.ia64.rpm 67fea0b6a19a657a6533a49ecb2f0391 seamonkey-nss-1.0.6-0.1.el2.ia64.rpm 9dc188e4ef1881e276517062be62fd82 seamonkey-nss-devel-1.0.6-0.1.el2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/seamonkey-1.0.6-0.1.el2.src.rpm 70eb479ad436bb82e7e15a7b1b49e054 seamonkey-1.0.6-0.1.el2.src.rpm ia64: a2819cd488d3349a6a14e0ca5c727ce3 seamonkey-1.0.6-0.1.el2.ia64.rpm deb1723d39abe08d561de2ccf6c1e19f seamonkey-chat-1.0.6-0.1.el2.ia64.rpm a022dc2595e44f4e2b1c2babfc46b7fc seamonkey-devel-1.0.6-0.1.el2.ia64.rpm 9963a7f3e508c83d450e845414fb33a9 seamonkey-dom-inspector-1.0.6-0.1.el2.ia64.rpm aa7a8dda0b6be6db3fc1cf1ed5280a0e seamonkey-js-debugger-1.0.6-0.1.el2.ia64.rpm 0973140763cf7185faa79a75b94ae0a9 seamonkey-mail-1.0.6-0.1.el2.ia64.rpm 4d6db192b854f47180ae0069c1411b47 seamonkey-nspr-1.0.6-0.1.el2.ia64.rpm 37b3548dd349915fdaf697265e967679 seamonkey-nspr-devel-1.0.6-0.1.el2.ia64.rpm 67fea0b6a19a657a6533a49ecb2f0391 seamonkey-nss-1.0.6-0.1.el2.ia64.rpm 9dc188e4ef1881e276517062be62fd82 seamonkey-nss-devel-1.0.6-0.1.el2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/seamonkey-1.0.6-0.1.el2.src.rpm 70eb479ad436bb82e7e15a7b1b49e054 seamonkey-1.0.6-0.1.el2.src.rpm i386: c01ef57f0ff28667337f64d2d36415cf seamonkey-1.0.6-0.1.el2.i386.rpm baab959f19a3b405cc743c2cd1dc3ec0 seamonkey-chat-1.0.6-0.1.el2.i386.rpm db67f7079da4a6dac8da865ce60fa56b seamonkey-devel-1.0.6-0.1.el2.i386.rpm d2ab7b4dfd1da40c62f9068d89156b45 seamonkey-dom-inspector-1.0.6-0.1.el2.i386.rpm 174918966041dc32da9f0ea73e523503 seamonkey-js-debugger-1.0.6-0.1.el2.i386.rpm 65124751f70a5704b04886fefa11988c seamonkey-mail-1.0.6-0.1.el2.i386.rpm d1b870ab9237e0dd9cfe5166fdfdac8a seamonkey-nspr-1.0.6-0.1.el2.i386.rpm 895e2ace4fa6cd8bf5064fd2e4926351 seamonkey-nspr-devel-1.0.6-0.1.el2.i386.rpm 82a975c0a32a4d26afd96a0ad9c1b966 seamonkey-nss-1.0.6-0.1.el2.i386.rpm 9a5985a9ee73879cfdf974fd110071b9 seamonkey-nss-devel-1.0.6-0.1.el2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/seamonkey-1.0.6-0.1.el2.src.rpm 70eb479ad436bb82e7e15a7b1b49e054 seamonkey-1.0.6-0.1.el2.src.rpm i386: c01ef57f0ff28667337f64d2d36415cf seamonkey-1.0.6-0.1.el2.i386.rpm baab959f19a3b405cc743c2cd1dc3ec0 seamonkey-chat-1.0.6-0.1.el2.i386.rpm db67f7079da4a6dac8da865ce60fa56b seamonkey-devel-1.0.6-0.1.el2.i386.rpm d2ab7b4dfd1da40c62f9068d89156b45 seamonkey-dom-inspector-1.0.6-0.1.el2.i386.rpm 174918966041dc32da9f0ea73e523503 seamonkey-js-debugger-1.0.6-0.1.el2.i386.rpm 65124751f70a5704b04886fefa11988c seamonkey-mail-1.0.6-0.1.el2.i386.rpm d1b870ab9237e0dd9cfe5166fdfdac8a seamonkey-nspr-1.0.6-0.1.el2.i386.rpm 895e2ace4fa6cd8bf5064fd2e4926351 seamonkey-nspr-devel-1.0.6-0.1.el2.i386.rpm 82a975c0a32a4d26afd96a0ad9c1b966 seamonkey-nss-1.0.6-0.1.el2.i386.rpm 9a5985a9ee73879cfdf974fd110071b9 seamonkey-nss-devel-1.0.6-0.1.el2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/seamonkey-1.0.6-0.1.el3.src.rpm 9d26d38f3d2617ae06182ab17e5dc1e5 seamonkey-1.0.6-0.1.el3.src.rpm i386: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm 9a4ce055af5a5f2d79fed565602e8214 seamonkey-chat-1.0.6-0.1.el3.i386.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 1c2a7135767ee5d4ff07a9baaa0b1950 seamonkey-devel-1.0.6-0.1.el3.i386.rpm e84ebaaed0659ecb0a7da455a807bb28 seamonkey-dom-inspector-1.0.6-0.1.el3.i386.rpm 7092edd7cc344c1ccae92d0bf2b48e13 seamonkey-js-debugger-1.0.6-0.1.el3.i386.rpm 0633f655012090b25e967eb17c541edd seamonkey-mail-1.0.6-0.1.el3.i386.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm a8dfc9a3c64f03c6a1fa02fd17c4a4d2 seamonkey-nspr-devel-1.0.6-0.1.el3.i386.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 60b9bb7d3afac792292010c8ec11c0f6 seamonkey-nss-devel-1.0.6-0.1.el3.i386.rpm ia64: 43a154a2712c69cb0c2f44edcf6b05a7 seamonkey-1.0.6-0.1.el3.ia64.rpm 080aaa86970e03745790ed8fcaf2fef6 seamonkey-chat-1.0.6-0.1.el3.ia64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 256a618f364252d252501679d862ee6a seamonkey-debuginfo-1.0.6-0.1.el3.ia64.rpm 98e48860061277eed4b8e859eee8a663 seamonkey-devel-1.0.6-0.1.el3.ia64.rpm 4939698f1eb70742e29030018b3b61b7 seamonkey-dom-inspector-1.0.6-0.1.el3.ia64.rpm 3ab5d4d7070940f87bfc816d0c5e8bc0 seamonkey-js-debugger-1.0.6-0.1.el3.ia64.rpm 23253826da34fea863c5268a08fb238e seamonkey-mail-1.0.6-0.1.el3.ia64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm e3e17d1ad530f5d445aaaef0b3483a87 seamonkey-nspr-1.0.6-0.1.el3.ia64.rpm f6736e89cae7a163d422d695d2d78d8a seamonkey-nspr-devel-1.0.6-0.1.el3.ia64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 22e87bac73022409cd310be147baed51 seamonkey-nss-1.0.6-0.1.el3.ia64.rpm 2d9e908a7fbdbb4557ac28efc93572b1 seamonkey-nss-devel-1.0.6-0.1.el3.ia64.rpm ppc: 2c983a524793f46f62e9f0edf42a8a3c seamonkey-1.0.6-0.1.el3.ppc.rpm 7d06ce69ebf2f7bf6625101c7020e3e6 seamonkey-chat-1.0.6-0.1.el3.ppc.rpm 3aab5c6b04aa9f39911eb2c1c6f13c06 seamonkey-debuginfo-1.0.6-0.1.el3.ppc.rpm 51b09403779a039b0e9da71e250c9fd5 seamonkey-devel-1.0.6-0.1.el3.ppc.rpm 25865bb777b9ca9498774cc2e4fd94a4 seamonkey-dom-inspector-1.0.6-0.1.el3.ppc.rpm e6ff3ccbd7695b5020d205dcfde9a8cb seamonkey-js-debugger-1.0.6-0.1.el3.ppc.rpm d658cb205d89dfc80461973afa441021 seamonkey-mail-1.0.6-0.1.el3.ppc.rpm 6591691acba4673ce4dcea4632ab2054 seamonkey-nspr-1.0.6-0.1.el3.ppc.rpm 438e7586edd6b326dd0b2c3a56df822d seamonkey-nspr-devel-1.0.6-0.1.el3.ppc.rpm daaf82e50d6a4e11a1e451b95628ddbb seamonkey-nss-1.0.6-0.1.el3.ppc.rpm 12d9693f56a0d1c7197fb4704a3f838a seamonkey-nss-devel-1.0.6-0.1.el3.ppc.rpm s390: 68674353821273f9a07921f5c2edaa64 seamonkey-1.0.6-0.1.el3.s390.rpm d9067c6582f3a696846f56616201ce43 seamonkey-chat-1.0.6-0.1.el3.s390.rpm a253594bd50ffc50888820f2ff731582 seamonkey-debuginfo-1.0.6-0.1.el3.s390.rpm 155fcac2af3c5c3833ff6ef49d91731d seamonkey-devel-1.0.6-0.1.el3.s390.rpm ebeaae41f3cf6740e840de3acf381c11 seamonkey-dom-inspector-1.0.6-0.1.el3.s390.rpm 346f3be445a6aae0008d290e11017adc seamonkey-js-debugger-1.0.6-0.1.el3.s390.rpm ad20e7ec2e5eb66f50b2db710f5c8b37 seamonkey-mail-1.0.6-0.1.el3.s390.rpm 883cc28c9b992db1140cd2ad68949fa8 seamonkey-nspr-1.0.6-0.1.el3.s390.rpm ae78341f2fa2782f47489d46113b8313 seamonkey-nspr-devel-1.0.6-0.1.el3.s390.rpm 33e845ee05e43bd08992d4d4428c3ca3 seamonkey-nss-1.0.6-0.1.el3.s390.rpm b1560868f1ab4c8dab8cb3363da31b4c seamonkey-nss-devel-1.0.6-0.1.el3.s390.rpm s390x: db6def3c8d44f0e8383973bdad56007a seamonkey-1.0.6-0.1.el3.s390x.rpm bedd61718eface911c0dd0c751af86dd seamonkey-chat-1.0.6-0.1.el3.s390x.rpm a253594bd50ffc50888820f2ff731582 seamonkey-debuginfo-1.0.6-0.1.el3.s390.rpm 6ee833f6be1ce5ac69ad6ab646307e02 seamonkey-debuginfo-1.0.6-0.1.el3.s390x.rpm d6189cb383e993f50f8f0d73cb35e75e seamonkey-devel-1.0.6-0.1.el3.s390x.rpm 3619a3efa02b34d2aba145f183750dce seamonkey-dom-inspector-1.0.6-0.1.el3.s390x.rpm 102dd600f0c848c3ba2e7dda5de61e22 seamonkey-js-debugger-1.0.6-0.1.el3.s390x.rpm caeb2e302e6ad38289b88cbe10f5beda seamonkey-mail-1.0.6-0.1.el3.s390x.rpm 883cc28c9b992db1140cd2ad68949fa8 seamonkey-nspr-1.0.6-0.1.el3.s390.rpm e74d59c59beb5561206850e100bfcd92 seamonkey-nspr-1.0.6-0.1.el3.s390x.rpm 8ef9e8f539d767ce9d62f6eb7d3ae514 seamonkey-nspr-devel-1.0.6-0.1.el3.s390x.rpm 33e845ee05e43bd08992d4d4428c3ca3 seamonkey-nss-1.0.6-0.1.el3.s390.rpm ce00089c0805c395a7fec6b28e568ebd seamonkey-nss-1.0.6-0.1.el3.s390x.rpm f07d4dd8a7dabcd26b0aec2a3399011e seamonkey-nss-devel-1.0.6-0.1.el3.s390x.rpm x86_64: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm bb22f1240b6007d9724d0789c1bacc0c seamonkey-1.0.6-0.1.el3.x86_64.rpm 1cb2c73a280fb5dc2719004b2d1ee3c2 seamonkey-chat-1.0.6-0.1.el3.x86_64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm c08983c04ec01379333e72422b31adf3 seamonkey-debuginfo-1.0.6-0.1.el3.x86_64.rpm 6fe339823afc1ade593e039b0a7db011 seamonkey-devel-1.0.6-0.1.el3.x86_64.rpm 2bb302e325cb7ec6b0d68d368622df93 seamonkey-dom-inspector-1.0.6-0.1.el3.x86_64.rpm 932b312012715bd70a512365d702d353 seamonkey-js-debugger-1.0.6-0.1.el3.x86_64.rpm 42f2ece83e6019e4b9b6275ffbeb990a seamonkey-mail-1.0.6-0.1.el3.x86_64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm 8e87d53e1a2834999df1ede75d90f7f8 seamonkey-nspr-1.0.6-0.1.el3.x86_64.rpm e7e3fbf18efa15d82c683f1a4932eb7c seamonkey-nspr-devel-1.0.6-0.1.el3.x86_64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 274d751fade315ffdea52383cd75854a seamonkey-nss-1.0.6-0.1.el3.x86_64.rpm 1b30d7e8db64e49dc200a320eed2cd58 seamonkey-nss-devel-1.0.6-0.1.el3.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/seamonkey-1.0.6-0.1.el3.src.rpm 9d26d38f3d2617ae06182ab17e5dc1e5 seamonkey-1.0.6-0.1.el3.src.rpm i386: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm 9a4ce055af5a5f2d79fed565602e8214 seamonkey-chat-1.0.6-0.1.el3.i386.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 1c2a7135767ee5d4ff07a9baaa0b1950 seamonkey-devel-1.0.6-0.1.el3.i386.rpm e84ebaaed0659ecb0a7da455a807bb28 seamonkey-dom-inspector-1.0.6-0.1.el3.i386.rpm 7092edd7cc344c1ccae92d0bf2b48e13 seamonkey-js-debugger-1.0.6-0.1.el3.i386.rpm 0633f655012090b25e967eb17c541edd seamonkey-mail-1.0.6-0.1.el3.i386.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm a8dfc9a3c64f03c6a1fa02fd17c4a4d2 seamonkey-nspr-devel-1.0.6-0.1.el3.i386.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 60b9bb7d3afac792292010c8ec11c0f6 seamonkey-nss-devel-1.0.6-0.1.el3.i386.rpm x86_64: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm bb22f1240b6007d9724d0789c1bacc0c seamonkey-1.0.6-0.1.el3.x86_64.rpm 1cb2c73a280fb5dc2719004b2d1ee3c2 seamonkey-chat-1.0.6-0.1.el3.x86_64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm c08983c04ec01379333e72422b31adf3 seamonkey-debuginfo-1.0.6-0.1.el3.x86_64.rpm 6fe339823afc1ade593e039b0a7db011 seamonkey-devel-1.0.6-0.1.el3.x86_64.rpm 2bb302e325cb7ec6b0d68d368622df93 seamonkey-dom-inspector-1.0.6-0.1.el3.x86_64.rpm 932b312012715bd70a512365d702d353 seamonkey-js-debugger-1.0.6-0.1.el3.x86_64.rpm 42f2ece83e6019e4b9b6275ffbeb990a seamonkey-mail-1.0.6-0.1.el3.x86_64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm 8e87d53e1a2834999df1ede75d90f7f8 seamonkey-nspr-1.0.6-0.1.el3.x86_64.rpm e7e3fbf18efa15d82c683f1a4932eb7c seamonkey-nspr-devel-1.0.6-0.1.el3.x86_64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 274d751fade315ffdea52383cd75854a seamonkey-nss-1.0.6-0.1.el3.x86_64.rpm 1b30d7e8db64e49dc200a320eed2cd58 seamonkey-nss-devel-1.0.6-0.1.el3.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/seamonkey-1.0.6-0.1.el3.src.rpm 9d26d38f3d2617ae06182ab17e5dc1e5 seamonkey-1.0.6-0.1.el3.src.rpm i386: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm 9a4ce055af5a5f2d79fed565602e8214 seamonkey-chat-1.0.6-0.1.el3.i386.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 1c2a7135767ee5d4ff07a9baaa0b1950 seamonkey-devel-1.0.6-0.1.el3.i386.rpm e84ebaaed0659ecb0a7da455a807bb28 seamonkey-dom-inspector-1.0.6-0.1.el3.i386.rpm 7092edd7cc344c1ccae92d0bf2b48e13 seamonkey-js-debugger-1.0.6-0.1.el3.i386.rpm 0633f655012090b25e967eb17c541edd seamonkey-mail-1.0.6-0.1.el3.i386.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm a8dfc9a3c64f03c6a1fa02fd17c4a4d2 seamonkey-nspr-devel-1.0.6-0.1.el3.i386.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 60b9bb7d3afac792292010c8ec11c0f6 seamonkey-nss-devel-1.0.6-0.1.el3.i386.rpm ia64: 43a154a2712c69cb0c2f44edcf6b05a7 seamonkey-1.0.6-0.1.el3.ia64.rpm 080aaa86970e03745790ed8fcaf2fef6 seamonkey-chat-1.0.6-0.1.el3.ia64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 256a618f364252d252501679d862ee6a seamonkey-debuginfo-1.0.6-0.1.el3.ia64.rpm 98e48860061277eed4b8e859eee8a663 seamonkey-devel-1.0.6-0.1.el3.ia64.rpm 4939698f1eb70742e29030018b3b61b7 seamonkey-dom-inspector-1.0.6-0.1.el3.ia64.rpm 3ab5d4d7070940f87bfc816d0c5e8bc0 seamonkey-js-debugger-1.0.6-0.1.el3.ia64.rpm 23253826da34fea863c5268a08fb238e seamonkey-mail-1.0.6-0.1.el3.ia64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm e3e17d1ad530f5d445aaaef0b3483a87 seamonkey-nspr-1.0.6-0.1.el3.ia64.rpm f6736e89cae7a163d422d695d2d78d8a seamonkey-nspr-devel-1.0.6-0.1.el3.ia64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 22e87bac73022409cd310be147baed51 seamonkey-nss-1.0.6-0.1.el3.ia64.rpm 2d9e908a7fbdbb4557ac28efc93572b1 seamonkey-nss-devel-1.0.6-0.1.el3.ia64.rpm x86_64: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm bb22f1240b6007d9724d0789c1bacc0c seamonkey-1.0.6-0.1.el3.x86_64.rpm 1cb2c73a280fb5dc2719004b2d1ee3c2 seamonkey-chat-1.0.6-0.1.el3.x86_64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm c08983c04ec01379333e72422b31adf3 seamonkey-debuginfo-1.0.6-0.1.el3.x86_64.rpm 6fe339823afc1ade593e039b0a7db011 seamonkey-devel-1.0.6-0.1.el3.x86_64.rpm 2bb302e325cb7ec6b0d68d368622df93 seamonkey-dom-inspector-1.0.6-0.1.el3.x86_64.rpm 932b312012715bd70a512365d702d353 seamonkey-js-debugger-1.0.6-0.1.el3.x86_64.rpm 42f2ece83e6019e4b9b6275ffbeb990a seamonkey-mail-1.0.6-0.1.el3.x86_64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm 8e87d53e1a2834999df1ede75d90f7f8 seamonkey-nspr-1.0.6-0.1.el3.x86_64.rpm e7e3fbf18efa15d82c683f1a4932eb7c seamonkey-nspr-devel-1.0.6-0.1.el3.x86_64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 274d751fade315ffdea52383cd75854a seamonkey-nss-1.0.6-0.1.el3.x86_64.rpm 1b30d7e8db64e49dc200a320eed2cd58 seamonkey-nss-devel-1.0.6-0.1.el3.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/seamonkey-1.0.6-0.1.el3.src.rpm 9d26d38f3d2617ae06182ab17e5dc1e5 seamonkey-1.0.6-0.1.el3.src.rpm i386: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm 9a4ce055af5a5f2d79fed565602e8214 seamonkey-chat-1.0.6-0.1.el3.i386.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 1c2a7135767ee5d4ff07a9baaa0b1950 seamonkey-devel-1.0.6-0.1.el3.i386.rpm e84ebaaed0659ecb0a7da455a807bb28 seamonkey-dom-inspector-1.0.6-0.1.el3.i386.rpm 7092edd7cc344c1ccae92d0bf2b48e13 seamonkey-js-debugger-1.0.6-0.1.el3.i386.rpm 0633f655012090b25e967eb17c541edd seamonkey-mail-1.0.6-0.1.el3.i386.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm a8dfc9a3c64f03c6a1fa02fd17c4a4d2 seamonkey-nspr-devel-1.0.6-0.1.el3.i386.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 60b9bb7d3afac792292010c8ec11c0f6 seamonkey-nss-devel-1.0.6-0.1.el3.i386.rpm ia64: 43a154a2712c69cb0c2f44edcf6b05a7 seamonkey-1.0.6-0.1.el3.ia64.rpm 080aaa86970e03745790ed8fcaf2fef6 seamonkey-chat-1.0.6-0.1.el3.ia64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm 256a618f364252d252501679d862ee6a seamonkey-debuginfo-1.0.6-0.1.el3.ia64.rpm 98e48860061277eed4b8e859eee8a663 seamonkey-devel-1.0.6-0.1.el3.ia64.rpm 4939698f1eb70742e29030018b3b61b7 seamonkey-dom-inspector-1.0.6-0.1.el3.ia64.rpm 3ab5d4d7070940f87bfc816d0c5e8bc0 seamonkey-js-debugger-1.0.6-0.1.el3.ia64.rpm 23253826da34fea863c5268a08fb238e seamonkey-mail-1.0.6-0.1.el3.ia64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm e3e17d1ad530f5d445aaaef0b3483a87 seamonkey-nspr-1.0.6-0.1.el3.ia64.rpm f6736e89cae7a163d422d695d2d78d8a seamonkey-nspr-devel-1.0.6-0.1.el3.ia64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 22e87bac73022409cd310be147baed51 seamonkey-nss-1.0.6-0.1.el3.ia64.rpm 2d9e908a7fbdbb4557ac28efc93572b1 seamonkey-nss-devel-1.0.6-0.1.el3.ia64.rpm x86_64: 6ea6f4f2f667b9fa6d2edafe3c0094d0 seamonkey-1.0.6-0.1.el3.i386.rpm bb22f1240b6007d9724d0789c1bacc0c seamonkey-1.0.6-0.1.el3.x86_64.rpm 1cb2c73a280fb5dc2719004b2d1ee3c2 seamonkey-chat-1.0.6-0.1.el3.x86_64.rpm 104b3574414e4e4caad147358ac09404 seamonkey-debuginfo-1.0.6-0.1.el3.i386.rpm c08983c04ec01379333e72422b31adf3 seamonkey-debuginfo-1.0.6-0.1.el3.x86_64.rpm 6fe339823afc1ade593e039b0a7db011 seamonkey-devel-1.0.6-0.1.el3.x86_64.rpm 2bb302e325cb7ec6b0d68d368622df93 seamonkey-dom-inspector-1.0.6-0.1.el3.x86_64.rpm 932b312012715bd70a512365d702d353 seamonkey-js-debugger-1.0.6-0.1.el3.x86_64.rpm 42f2ece83e6019e4b9b6275ffbeb990a seamonkey-mail-1.0.6-0.1.el3.x86_64.rpm 773aa8cea814a80424d699a87083a5dd seamonkey-nspr-1.0.6-0.1.el3.i386.rpm 8e87d53e1a2834999df1ede75d90f7f8 seamonkey-nspr-1.0.6-0.1.el3.x86_64.rpm e7e3fbf18efa15d82c683f1a4932eb7c seamonkey-nspr-devel-1.0.6-0.1.el3.x86_64.rpm dc6be5b7ac57f3a52a1635ed16dd9288 seamonkey-nss-1.0.6-0.1.el3.i386.rpm 274d751fade315ffdea52383cd75854a seamonkey-nss-1.0.6-0.1.el3.x86_64.rpm 1b30d7e8db64e49dc200a320eed2cd58 seamonkey-nss-devel-1.0.6-0.1.el3.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/devhelp-0.10-0.5.el4.src.rpm b3b36cd53abb8e57891b4a910f3ca167 devhelp-0.10-0.5.el4.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/seamonkey-1.0.6-0.1.el4.src.rpm 4f36acb8693c1b4d90ca95035ee37ed9 seamonkey-1.0.6-0.1.el4.src.rpm i386: 406cda1b5dd30b0bbad0b0280fd00f4b devhelp-0.10-0.5.el4.i386.rpm 93910b0c4badc48d8904f2177b4ee1e8 devhelp-debuginfo-0.10-0.5.el4.i386.rpm 1964a3ff90d89fd44cc433884e448ec9 devhelp-devel-0.10-0.5.el4.i386.rpm 536b9b2fa70a000db7d56216ad7e16c4 seamonkey-1.0.6-0.1.el4.i386.rpm e5915594e19fb8e45153cdc1bde1208b seamonkey-chat-1.0.6-0.1.el4.i386.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 2ed631181ec82a33313237a98f98576b seamonkey-devel-1.0.6-0.1.el4.i386.rpm 200064c63015eea8cdc87c997028be41 seamonkey-dom-inspector-1.0.6-0.1.el4.i386.rpm 4a8f3541f3ba30ad0af4ffded16bb737 seamonkey-js-debugger-1.0.6-0.1.el4.i386.rpm 5f167767b5a23ea1e884f177e27e327c seamonkey-mail-1.0.6-0.1.el4.i386.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 9501e8c705c6e124d167f27c95f31844 seamonkey-nspr-devel-1.0.6-0.1.el4.i386.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5e2ec50a38e41ce1d7ec38987e1b37a0 seamonkey-nss-devel-1.0.6-0.1.el4.i386.rpm ia64: 864df384ab4d9436f822c23a3ab68d86 seamonkey-1.0.6-0.1.el4.ia64.rpm 9df50f5a3ab60500f196f73fb86db705 seamonkey-chat-1.0.6-0.1.el4.ia64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 6b15427471355bf202658660847c87ee seamonkey-debuginfo-1.0.6-0.1.el4.ia64.rpm 862580eb290fe10fb07e11a488106b5f seamonkey-devel-1.0.6-0.1.el4.ia64.rpm ef08d1aac3c9332ff7ff2f7adf81d48f seamonkey-dom-inspector-1.0.6-0.1.el4.ia64.rpm df43fe54b67ba8de4495b25ac756ea44 seamonkey-js-debugger-1.0.6-0.1.el4.ia64.rpm b8e38e77fe6c00a8b046f2f2295c7b16 seamonkey-mail-1.0.6-0.1.el4.ia64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 2b94a3c404747dab08d87952bdb23e3e seamonkey-nspr-1.0.6-0.1.el4.ia64.rpm 9279a6ebd106c983c1eb3173ac80c846 seamonkey-nspr-devel-1.0.6-0.1.el4.ia64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5c41b25c59884ab232d233a11436401e seamonkey-nss-1.0.6-0.1.el4.ia64.rpm 33a0f4ee6ad0f8b9adaa69a7239e6f9e seamonkey-nss-devel-1.0.6-0.1.el4.ia64.rpm ppc: 47d2924cff9b8db4a96e4f83ffeb273a devhelp-0.10-0.5.el4.ppc.rpm 0496364b157577a78134041435e8c736 devhelp-debuginfo-0.10-0.5.el4.ppc.rpm 8a6e2001653164b7bd6c2e8e46d8e2a2 devhelp-devel-0.10-0.5.el4.ppc.rpm 7cbd24771d9189268d2a96d0f1588f1a seamonkey-1.0.6-0.1.el4.ppc.rpm 6b3d862ce865a4083c951130477a57a0 seamonkey-chat-1.0.6-0.1.el4.ppc.rpm 9bd2dd3f4abe480e32b97cd6b24f0de4 seamonkey-debuginfo-1.0.6-0.1.el4.ppc.rpm 3793e2d2d8de2d851d189e27460007a2 seamonkey-devel-1.0.6-0.1.el4.ppc.rpm 62f7252bc5392b2fcbb39c796fbec135 seamonkey-dom-inspector-1.0.6-0.1.el4.ppc.rpm 4bc9104c37e66509063bab30384dafba seamonkey-js-debugger-1.0.6-0.1.el4.ppc.rpm f6e3ba1010cbb13e57bd915a5748ccf5 seamonkey-mail-1.0.6-0.1.el4.ppc.rpm fd9eb2dbb80dfb1afe69fa73a5e63193 seamonkey-nspr-1.0.6-0.1.el4.ppc.rpm 6741f7ab8c0dabf43d269e8a7cd08e34 seamonkey-nspr-devel-1.0.6-0.1.el4.ppc.rpm 5129590b364faef23b7e51d069e82cf3 seamonkey-nss-1.0.6-0.1.el4.ppc.rpm 8c8c5a5773988baad15b669a902f395a seamonkey-nss-devel-1.0.6-0.1.el4.ppc.rpm s390: 00ea60aa367c9d3e5c0f2357c9a9afd5 seamonkey-1.0.6-0.1.el4.s390.rpm 4d9d10f72c7ff09506cb86f745a6af13 seamonkey-chat-1.0.6-0.1.el4.s390.rpm 9dc7ac667fcd1c978756d130289ed7f0 seamonkey-debuginfo-1.0.6-0.1.el4.s390.rpm 013a0e687a23ab55cd4cc345dccc8ee7 seamonkey-devel-1.0.6-0.1.el4.s390.rpm c08c7bdd386e256926aa80f610c53bed seamonkey-dom-inspector-1.0.6-0.1.el4.s390.rpm 30aec1022e64f2a997cc6907f4a1f91e seamonkey-js-debugger-1.0.6-0.1.el4.s390.rpm a0b8aa0698be6e3cd436dcec95c44948 seamonkey-mail-1.0.6-0.1.el4.s390.rpm baa80781a5c0c2e140d0e2ddfcdca85e seamonkey-nspr-1.0.6-0.1.el4.s390.rpm d23cdbe513ac2eab178b9ed06a5f9e0e seamonkey-nspr-devel-1.0.6-0.1.el4.s390.rpm cf2045777e46f19a0d2b47381875256e seamonkey-nss-1.0.6-0.1.el4.s390.rpm e23eb2f748943156000efb22d5182193 seamonkey-nss-devel-1.0.6-0.1.el4.s390.rpm s390x: 30c047467791de2e78076dc5a396eb6f seamonkey-1.0.6-0.1.el4.s390x.rpm 6caa5ec91b4fb3140620bf739020278b seamonkey-chat-1.0.6-0.1.el4.s390x.rpm eab58991d5ae777d26973efcfd54565d seamonkey-debuginfo-1.0.6-0.1.el4.s390x.rpm 2c0390c0ac040d4c8c4571a5d9db8352 seamonkey-devel-1.0.6-0.1.el4.s390x.rpm ed3557251bff3c9504c506c34d8ebd91 seamonkey-dom-inspector-1.0.6-0.1.el4.s390x.rpm 0e732f0f787b2ec27ec0fe18b37767e4 seamonkey-js-debugger-1.0.6-0.1.el4.s390x.rpm 5472caaca7b570c301d10f144b233b35 seamonkey-mail-1.0.6-0.1.el4.s390x.rpm baa80781a5c0c2e140d0e2ddfcdca85e seamonkey-nspr-1.0.6-0.1.el4.s390.rpm 40c27850dee092eb1b2a0160d3800239 seamonkey-nspr-1.0.6-0.1.el4.s390x.rpm c404d97d4a05b46b7777ac958e66e27b seamonkey-nspr-devel-1.0.6-0.1.el4.s390x.rpm cf2045777e46f19a0d2b47381875256e seamonkey-nss-1.0.6-0.1.el4.s390.rpm 7cedf53ea3d571f60b26a51422603cd6 seamonkey-nss-1.0.6-0.1.el4.s390x.rpm f35452455caef48549dc3a79215e8d1d seamonkey-nss-devel-1.0.6-0.1.el4.s390x.rpm x86_64: 6d9012413f132be8c1acc4ad0db4f41e devhelp-0.10-0.5.el4.x86_64.rpm 3803803372db61f342b8ff6c5deabee0 devhelp-debuginfo-0.10-0.5.el4.x86_64.rpm c4cd127091ced51dd6277f8d8b0ead04 devhelp-devel-0.10-0.5.el4.x86_64.rpm 10f48b61fae2f595941b13f71e5932ea seamonkey-1.0.6-0.1.el4.x86_64.rpm a897f3fa9b4980f50fe0aca65f5586b9 seamonkey-chat-1.0.6-0.1.el4.x86_64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm a31dfe883501471886714cc1a8567cc1 seamonkey-debuginfo-1.0.6-0.1.el4.x86_64.rpm 62225ca62526caca591dc14d42275b09 seamonkey-devel-1.0.6-0.1.el4.x86_64.rpm 63cfa1c3fe1ad1418420dc6785ebe09f seamonkey-dom-inspector-1.0.6-0.1.el4.x86_64.rpm 9e6f0d820802ea86fb08162648ab4268 seamonkey-js-debugger-1.0.6-0.1.el4.x86_64.rpm 62da3f3cb6552bfdcd6abd4dd62ea249 seamonkey-mail-1.0.6-0.1.el4.x86_64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm ed4c4a69c18295eba902ec0c37e478e0 seamonkey-nspr-1.0.6-0.1.el4.x86_64.rpm c087e646097a6130f6d22c7e491e589c seamonkey-nspr-devel-1.0.6-0.1.el4.x86_64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm f93f8458aabd3385f79d763ece640183 seamonkey-nss-1.0.6-0.1.el4.x86_64.rpm 878b46fd5e7ceb9a4b68156b68310e0e seamonkey-nss-devel-1.0.6-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/devhelp-0.10-0.5.el4.src.rpm b3b36cd53abb8e57891b4a910f3ca167 devhelp-0.10-0.5.el4.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/seamonkey-1.0.6-0.1.el4.src.rpm 4f36acb8693c1b4d90ca95035ee37ed9 seamonkey-1.0.6-0.1.el4.src.rpm i386: 406cda1b5dd30b0bbad0b0280fd00f4b devhelp-0.10-0.5.el4.i386.rpm 93910b0c4badc48d8904f2177b4ee1e8 devhelp-debuginfo-0.10-0.5.el4.i386.rpm 1964a3ff90d89fd44cc433884e448ec9 devhelp-devel-0.10-0.5.el4.i386.rpm 536b9b2fa70a000db7d56216ad7e16c4 seamonkey-1.0.6-0.1.el4.i386.rpm e5915594e19fb8e45153cdc1bde1208b seamonkey-chat-1.0.6-0.1.el4.i386.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 2ed631181ec82a33313237a98f98576b seamonkey-devel-1.0.6-0.1.el4.i386.rpm 200064c63015eea8cdc87c997028be41 seamonkey-dom-inspector-1.0.6-0.1.el4.i386.rpm 4a8f3541f3ba30ad0af4ffded16bb737 seamonkey-js-debugger-1.0.6-0.1.el4.i386.rpm 5f167767b5a23ea1e884f177e27e327c seamonkey-mail-1.0.6-0.1.el4.i386.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 9501e8c705c6e124d167f27c95f31844 seamonkey-nspr-devel-1.0.6-0.1.el4.i386.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5e2ec50a38e41ce1d7ec38987e1b37a0 seamonkey-nss-devel-1.0.6-0.1.el4.i386.rpm x86_64: 6d9012413f132be8c1acc4ad0db4f41e devhelp-0.10-0.5.el4.x86_64.rpm 3803803372db61f342b8ff6c5deabee0 devhelp-debuginfo-0.10-0.5.el4.x86_64.rpm c4cd127091ced51dd6277f8d8b0ead04 devhelp-devel-0.10-0.5.el4.x86_64.rpm 10f48b61fae2f595941b13f71e5932ea seamonkey-1.0.6-0.1.el4.x86_64.rpm a897f3fa9b4980f50fe0aca65f5586b9 seamonkey-chat-1.0.6-0.1.el4.x86_64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm a31dfe883501471886714cc1a8567cc1 seamonkey-debuginfo-1.0.6-0.1.el4.x86_64.rpm 62225ca62526caca591dc14d42275b09 seamonkey-devel-1.0.6-0.1.el4.x86_64.rpm 63cfa1c3fe1ad1418420dc6785ebe09f seamonkey-dom-inspector-1.0.6-0.1.el4.x86_64.rpm 9e6f0d820802ea86fb08162648ab4268 seamonkey-js-debugger-1.0.6-0.1.el4.x86_64.rpm 62da3f3cb6552bfdcd6abd4dd62ea249 seamonkey-mail-1.0.6-0.1.el4.x86_64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm ed4c4a69c18295eba902ec0c37e478e0 seamonkey-nspr-1.0.6-0.1.el4.x86_64.rpm c087e646097a6130f6d22c7e491e589c seamonkey-nspr-devel-1.0.6-0.1.el4.x86_64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm f93f8458aabd3385f79d763ece640183 seamonkey-nss-1.0.6-0.1.el4.x86_64.rpm 878b46fd5e7ceb9a4b68156b68310e0e seamonkey-nss-devel-1.0.6-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/devhelp-0.10-0.5.el4.src.rpm b3b36cd53abb8e57891b4a910f3ca167 devhelp-0.10-0.5.el4.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/seamonkey-1.0.6-0.1.el4.src.rpm 4f36acb8693c1b4d90ca95035ee37ed9 seamonkey-1.0.6-0.1.el4.src.rpm i386: 406cda1b5dd30b0bbad0b0280fd00f4b devhelp-0.10-0.5.el4.i386.rpm 93910b0c4badc48d8904f2177b4ee1e8 devhelp-debuginfo-0.10-0.5.el4.i386.rpm 1964a3ff90d89fd44cc433884e448ec9 devhelp-devel-0.10-0.5.el4.i386.rpm 536b9b2fa70a000db7d56216ad7e16c4 seamonkey-1.0.6-0.1.el4.i386.rpm e5915594e19fb8e45153cdc1bde1208b seamonkey-chat-1.0.6-0.1.el4.i386.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 2ed631181ec82a33313237a98f98576b seamonkey-devel-1.0.6-0.1.el4.i386.rpm 200064c63015eea8cdc87c997028be41 seamonkey-dom-inspector-1.0.6-0.1.el4.i386.rpm 4a8f3541f3ba30ad0af4ffded16bb737 seamonkey-js-debugger-1.0.6-0.1.el4.i386.rpm 5f167767b5a23ea1e884f177e27e327c seamonkey-mail-1.0.6-0.1.el4.i386.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 9501e8c705c6e124d167f27c95f31844 seamonkey-nspr-devel-1.0.6-0.1.el4.i386.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5e2ec50a38e41ce1d7ec38987e1b37a0 seamonkey-nss-devel-1.0.6-0.1.el4.i386.rpm ia64: 864df384ab4d9436f822c23a3ab68d86 seamonkey-1.0.6-0.1.el4.ia64.rpm 9df50f5a3ab60500f196f73fb86db705 seamonkey-chat-1.0.6-0.1.el4.ia64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 6b15427471355bf202658660847c87ee seamonkey-debuginfo-1.0.6-0.1.el4.ia64.rpm 862580eb290fe10fb07e11a488106b5f seamonkey-devel-1.0.6-0.1.el4.ia64.rpm ef08d1aac3c9332ff7ff2f7adf81d48f seamonkey-dom-inspector-1.0.6-0.1.el4.ia64.rpm df43fe54b67ba8de4495b25ac756ea44 seamonkey-js-debugger-1.0.6-0.1.el4.ia64.rpm b8e38e77fe6c00a8b046f2f2295c7b16 seamonkey-mail-1.0.6-0.1.el4.ia64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 2b94a3c404747dab08d87952bdb23e3e seamonkey-nspr-1.0.6-0.1.el4.ia64.rpm 9279a6ebd106c983c1eb3173ac80c846 seamonkey-nspr-devel-1.0.6-0.1.el4.ia64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5c41b25c59884ab232d233a11436401e seamonkey-nss-1.0.6-0.1.el4.ia64.rpm 33a0f4ee6ad0f8b9adaa69a7239e6f9e seamonkey-nss-devel-1.0.6-0.1.el4.ia64.rpm x86_64: 6d9012413f132be8c1acc4ad0db4f41e devhelp-0.10-0.5.el4.x86_64.rpm 3803803372db61f342b8ff6c5deabee0 devhelp-debuginfo-0.10-0.5.el4.x86_64.rpm c4cd127091ced51dd6277f8d8b0ead04 devhelp-devel-0.10-0.5.el4.x86_64.rpm 10f48b61fae2f595941b13f71e5932ea seamonkey-1.0.6-0.1.el4.x86_64.rpm a897f3fa9b4980f50fe0aca65f5586b9 seamonkey-chat-1.0.6-0.1.el4.x86_64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm a31dfe883501471886714cc1a8567cc1 seamonkey-debuginfo-1.0.6-0.1.el4.x86_64.rpm 62225ca62526caca591dc14d42275b09 seamonkey-devel-1.0.6-0.1.el4.x86_64.rpm 63cfa1c3fe1ad1418420dc6785ebe09f seamonkey-dom-inspector-1.0.6-0.1.el4.x86_64.rpm 9e6f0d820802ea86fb08162648ab4268 seamonkey-js-debugger-1.0.6-0.1.el4.x86_64.rpm 62da3f3cb6552bfdcd6abd4dd62ea249 seamonkey-mail-1.0.6-0.1.el4.x86_64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm ed4c4a69c18295eba902ec0c37e478e0 seamonkey-nspr-1.0.6-0.1.el4.x86_64.rpm c087e646097a6130f6d22c7e491e589c seamonkey-nspr-devel-1.0.6-0.1.el4.x86_64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm f93f8458aabd3385f79d763ece640183 seamonkey-nss-1.0.6-0.1.el4.x86_64.rpm 878b46fd5e7ceb9a4b68156b68310e0e seamonkey-nss-devel-1.0.6-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/devhelp-0.10-0.5.el4.src.rpm b3b36cd53abb8e57891b4a910f3ca167 devhelp-0.10-0.5.el4.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/seamonkey-1.0.6-0.1.el4.src.rpm 4f36acb8693c1b4d90ca95035ee37ed9 seamonkey-1.0.6-0.1.el4.src.rpm i386: 406cda1b5dd30b0bbad0b0280fd00f4b devhelp-0.10-0.5.el4.i386.rpm 93910b0c4badc48d8904f2177b4ee1e8 devhelp-debuginfo-0.10-0.5.el4.i386.rpm 1964a3ff90d89fd44cc433884e448ec9 devhelp-devel-0.10-0.5.el4.i386.rpm 536b9b2fa70a000db7d56216ad7e16c4 seamonkey-1.0.6-0.1.el4.i386.rpm e5915594e19fb8e45153cdc1bde1208b seamonkey-chat-1.0.6-0.1.el4.i386.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 2ed631181ec82a33313237a98f98576b seamonkey-devel-1.0.6-0.1.el4.i386.rpm 200064c63015eea8cdc87c997028be41 seamonkey-dom-inspector-1.0.6-0.1.el4.i386.rpm 4a8f3541f3ba30ad0af4ffded16bb737 seamonkey-js-debugger-1.0.6-0.1.el4.i386.rpm 5f167767b5a23ea1e884f177e27e327c seamonkey-mail-1.0.6-0.1.el4.i386.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 9501e8c705c6e124d167f27c95f31844 seamonkey-nspr-devel-1.0.6-0.1.el4.i386.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5e2ec50a38e41ce1d7ec38987e1b37a0 seamonkey-nss-devel-1.0.6-0.1.el4.i386.rpm ia64: 864df384ab4d9436f822c23a3ab68d86 seamonkey-1.0.6-0.1.el4.ia64.rpm 9df50f5a3ab60500f196f73fb86db705 seamonkey-chat-1.0.6-0.1.el4.ia64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm 6b15427471355bf202658660847c87ee seamonkey-debuginfo-1.0.6-0.1.el4.ia64.rpm 862580eb290fe10fb07e11a488106b5f seamonkey-devel-1.0.6-0.1.el4.ia64.rpm ef08d1aac3c9332ff7ff2f7adf81d48f seamonkey-dom-inspector-1.0.6-0.1.el4.ia64.rpm df43fe54b67ba8de4495b25ac756ea44 seamonkey-js-debugger-1.0.6-0.1.el4.ia64.rpm b8e38e77fe6c00a8b046f2f2295c7b16 seamonkey-mail-1.0.6-0.1.el4.ia64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm 2b94a3c404747dab08d87952bdb23e3e seamonkey-nspr-1.0.6-0.1.el4.ia64.rpm 9279a6ebd106c983c1eb3173ac80c846 seamonkey-nspr-devel-1.0.6-0.1.el4.ia64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm 5c41b25c59884ab232d233a11436401e seamonkey-nss-1.0.6-0.1.el4.ia64.rpm 33a0f4ee6ad0f8b9adaa69a7239e6f9e seamonkey-nss-devel-1.0.6-0.1.el4.ia64.rpm x86_64: 6d9012413f132be8c1acc4ad0db4f41e devhelp-0.10-0.5.el4.x86_64.rpm 3803803372db61f342b8ff6c5deabee0 devhelp-debuginfo-0.10-0.5.el4.x86_64.rpm c4cd127091ced51dd6277f8d8b0ead04 devhelp-devel-0.10-0.5.el4.x86_64.rpm 10f48b61fae2f595941b13f71e5932ea seamonkey-1.0.6-0.1.el4.x86_64.rpm a897f3fa9b4980f50fe0aca65f5586b9 seamonkey-chat-1.0.6-0.1.el4.x86_64.rpm 137a0ae2431598ce837bd1bc4e040c44 seamonkey-debuginfo-1.0.6-0.1.el4.i386.rpm a31dfe883501471886714cc1a8567cc1 seamonkey-debuginfo-1.0.6-0.1.el4.x86_64.rpm 62225ca62526caca591dc14d42275b09 seamonkey-devel-1.0.6-0.1.el4.x86_64.rpm 63cfa1c3fe1ad1418420dc6785ebe09f seamonkey-dom-inspector-1.0.6-0.1.el4.x86_64.rpm 9e6f0d820802ea86fb08162648ab4268 seamonkey-js-debugger-1.0.6-0.1.el4.x86_64.rpm 62da3f3cb6552bfdcd6abd4dd62ea249 seamonkey-mail-1.0.6-0.1.el4.x86_64.rpm 48a0d94d92b9009106254c020a949245 seamonkey-nspr-1.0.6-0.1.el4.i386.rpm ed4c4a69c18295eba902ec0c37e478e0 seamonkey-nspr-1.0.6-0.1.el4.x86_64.rpm c087e646097a6130f6d22c7e491e589c seamonkey-nspr-devel-1.0.6-0.1.el4.x86_64.rpm b65e4a92cb8e4c735ef7b4139e8bdbf6 seamonkey-nss-1.0.6-0.1.el4.i386.rpm f93f8458aabd3385f79d763ece640183 seamonkey-nss-1.0.6-0.1.el4.x86_64.rpm 878b46fd5e7ceb9a4b68156b68310e0e seamonkey-nss-devel-1.0.6-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFUagIXlSAg2UNWIIRAhmIAJ0RRusb0DPjiP4QPs2uUvqMltDqKQCffzuo LJUIJqht0v+cu8BsknjvKK8= =peVv -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 8 09:49:17 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Nov 2006 04:49:17 -0500 Subject: [RHSA-2006:0735-01] Critical: thunderbird security update Message-ID: <200611080949.kA89nHOK022801@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: thunderbird security update Advisory ID: RHSA-2006:0735-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0735.html Issue date: 2006-11-08 Updated on: 2006-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5462 CVE-2006-5463 CVE-2006-5464 CVE-2006-5747 CVE-2006-5748 - --------------------------------------------------------------------- 1. Summary: Updated thunderbird packages that fix several security bugs are now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the way Thunderbird processes certain malformed Javascript code. A malicious HTML mail message could cause the execution of Javascript code in such a way that could cause Thunderbird to crash or execute arbitrary code as the user running Thunderbird. (CVE-2006-5463, CVE-2006-5747, CVE-2006-5748) Several flaws were found in the way Thunderbird renders HTML mail messages. A malicious HTML mail message could cause the mail client to crash or possibly execute arbitrary code as the user running Thunderbird. (CVE-2006-5464) A flaw was found in the way Thunderbird verifies RSA signatures. For RSA keys with exponent 3 it is possible for an attacker to forge a signature that would be incorrectly verified by the NSS library. Thunderbird as shipped trusts several root Certificate Authorities that use exponent 3. An attacker could have created a carefully crafted SSL certificate which would be incorrectly trusted when their site was visited by a victim. This flaw was previously thought to be fixed in Thunderbird 1.5.0.7, however Ulrich Kuehn discovered the fix was incomplete (CVE-2006-5462) Users of Thunderbird are advised to upgrade to this update, which contains Thunderbird version 1.5.0.8 that corrects these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 214450 - CVE-2006-5462 Multiple thunderbird vulnerabilities (CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748) 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/thunderbird-1.5.0.8-0.1.el4.src.rpm 3b42db7cd5de96204220fc212064b368 thunderbird-1.5.0.8-0.1.el4.src.rpm i386: 6846d16a9833cd58d38c6d0267837152 thunderbird-1.5.0.8-0.1.el4.i386.rpm 0298dc3998a510a9969ebd2be25fd7fd thunderbird-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 9b557c66d3dcbbb4c71984bec11eb1fa thunderbird-1.5.0.8-0.1.el4.ia64.rpm be9567100aba0f74790bfed2302387fe thunderbird-debuginfo-1.5.0.8-0.1.el4.ia64.rpm ppc: 5254c63c36ecdc78fd449ec676dbbb51 thunderbird-1.5.0.8-0.1.el4.ppc.rpm c1c55d07f66b21162fb2b4b453a2140b thunderbird-debuginfo-1.5.0.8-0.1.el4.ppc.rpm s390: c99069f348e8000d097c063481c65161 thunderbird-1.5.0.8-0.1.el4.s390.rpm 8a08b48a7f065ff9b896f3358d27143a thunderbird-debuginfo-1.5.0.8-0.1.el4.s390.rpm s390x: df7a17a986408c46edbc41b635979e70 thunderbird-1.5.0.8-0.1.el4.s390x.rpm 7e3e505e5107d1f570e5816997ba8d9f thunderbird-debuginfo-1.5.0.8-0.1.el4.s390x.rpm x86_64: 66192461dde3955b47a05c5a590f2ab2 thunderbird-1.5.0.8-0.1.el4.x86_64.rpm db5311f525dac8fe5d3c002aca7cef54 thunderbird-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/thunderbird-1.5.0.8-0.1.el4.src.rpm 3b42db7cd5de96204220fc212064b368 thunderbird-1.5.0.8-0.1.el4.src.rpm i386: 6846d16a9833cd58d38c6d0267837152 thunderbird-1.5.0.8-0.1.el4.i386.rpm 0298dc3998a510a9969ebd2be25fd7fd thunderbird-debuginfo-1.5.0.8-0.1.el4.i386.rpm x86_64: 66192461dde3955b47a05c5a590f2ab2 thunderbird-1.5.0.8-0.1.el4.x86_64.rpm db5311f525dac8fe5d3c002aca7cef54 thunderbird-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/thunderbird-1.5.0.8-0.1.el4.src.rpm 3b42db7cd5de96204220fc212064b368 thunderbird-1.5.0.8-0.1.el4.src.rpm i386: 6846d16a9833cd58d38c6d0267837152 thunderbird-1.5.0.8-0.1.el4.i386.rpm 0298dc3998a510a9969ebd2be25fd7fd thunderbird-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 9b557c66d3dcbbb4c71984bec11eb1fa thunderbird-1.5.0.8-0.1.el4.ia64.rpm be9567100aba0f74790bfed2302387fe thunderbird-debuginfo-1.5.0.8-0.1.el4.ia64.rpm x86_64: 66192461dde3955b47a05c5a590f2ab2 thunderbird-1.5.0.8-0.1.el4.x86_64.rpm db5311f525dac8fe5d3c002aca7cef54 thunderbird-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/thunderbird-1.5.0.8-0.1.el4.src.rpm 3b42db7cd5de96204220fc212064b368 thunderbird-1.5.0.8-0.1.el4.src.rpm i386: 6846d16a9833cd58d38c6d0267837152 thunderbird-1.5.0.8-0.1.el4.i386.rpm 0298dc3998a510a9969ebd2be25fd7fd thunderbird-debuginfo-1.5.0.8-0.1.el4.i386.rpm ia64: 9b557c66d3dcbbb4c71984bec11eb1fa thunderbird-1.5.0.8-0.1.el4.ia64.rpm be9567100aba0f74790bfed2302387fe thunderbird-debuginfo-1.5.0.8-0.1.el4.ia64.rpm x86_64: 66192461dde3955b47a05c5a590f2ab2 thunderbird-1.5.0.8-0.1.el4.x86_64.rpm db5311f525dac8fe5d3c002aca7cef54 thunderbird-debuginfo-1.5.0.8-0.1.el4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5462 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5463 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5464 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5748 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFUagaXlSAg2UNWIIRAhvxAJ9Ne+HCgi2uhiZSLfA7OcenGfqaeQCfe4IZ KycjDEhi7PU5mKUM2DUnVs8= =Z4qH -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 8 10:02:23 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Nov 2006 05:02:23 -0500 Subject: [RHSA-2006:0727-01] Moderate: texinfo security update Message-ID: <200611081002.kA8A2NAw023298@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: texinfo security update Advisory ID: RHSA-2006:0727-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0727.html Issue date: 2006-11-08 Updated on: 2006-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3011 CVE-2006-4810 - --------------------------------------------------------------------- 1. Summary: New Texinfo packages that fix various security vulnerabilities are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Texinfo is a documentation system that can produce both online information and printed output from a single source file. A buffer overflow flaw was found in Texinfo's texindex command. An attacker could construct a carefully crafted Texinfo file that could cause texindex to crash or possibly execute arbitrary code when opened. (CVE-2006-4810) A flaw was found in the way Texinfo's texindex command creates temporary files. A local user could leverage this flaw to overwrite files the user executing texindex has write access to. (CVE-2005-3011) Users of Texinfo should upgrade to these updated packages which contain backported patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 169583 - CVE-2005-3011 texindex insecure temporary file usage 170743 - CVE-2005-3011 texindex insecure temporary file usage 170744 - CVE-2005-3011 texindex insecure temporary file usage 211484 - CVE-2006-4810 texindex buffer overflow 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm 4f77dc80717cf15b1f565cb8dfb12b8c texinfo-4.0b-3.el2.1.src.rpm i386: 878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm 58cc2bc691496d3aef522fc87449554b texinfo-4.0b-3.el2.1.i386.rpm ia64: a259d8d26dbaa8cc96686f169dc05911 info-4.0b-3.el2.1.ia64.rpm 6fae56c8168b45be80ae719ebe0aca82 texinfo-4.0b-3.el2.1.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm 4f77dc80717cf15b1f565cb8dfb12b8c texinfo-4.0b-3.el2.1.src.rpm ia64: a259d8d26dbaa8cc96686f169dc05911 info-4.0b-3.el2.1.ia64.rpm 6fae56c8168b45be80ae719ebe0aca82 texinfo-4.0b-3.el2.1.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm 4f77dc80717cf15b1f565cb8dfb12b8c texinfo-4.0b-3.el2.1.src.rpm i386: 878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm 58cc2bc691496d3aef522fc87449554b texinfo-4.0b-3.el2.1.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm 4f77dc80717cf15b1f565cb8dfb12b8c texinfo-4.0b-3.el2.1.src.rpm i386: 878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm 58cc2bc691496d3aef522fc87449554b texinfo-4.0b-3.el2.1.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm cae389223d777d79c862b4672c75a9e1 texinfo-4.5-3.el3.1.src.rpm i386: 1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm 04bd5020018f6727b77fd8c2a9fb2588 texinfo-4.5-3.el3.1.i386.rpm 1ee197caad9a5c8fa930215a7c5ca9e6 texinfo-debuginfo-4.5-3.el3.1.i386.rpm ia64: 42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm 3fabad46614f61118bc29cffbd83df54 texinfo-4.5-3.el3.1.ia64.rpm d8bb2bd2fd7be72a8822e93b1372b625 texinfo-debuginfo-4.5-3.el3.1.ia64.rpm ppc: 5fe3e1eca608678fc0770f0de702cd8d info-4.5-3.el3.1.ppc.rpm 9275ad56b995b25f275af0a44c3d01bf texinfo-4.5-3.el3.1.ppc.rpm f54a3f00a87b3ce1d4d0af73f0601bf7 texinfo-debuginfo-4.5-3.el3.1.ppc.rpm s390: 215d4ea1202a2309c7c676e3c1e46299 info-4.5-3.el3.1.s390.rpm 7085ead3927535c315c336c3314b9d2f texinfo-4.5-3.el3.1.s390.rpm 2d670e1ec1d3ab67628aa982d125bed4 texinfo-debuginfo-4.5-3.el3.1.s390.rpm s390x: fd6332f0b59ad9bd8f99cf40a8ff1ad9 info-4.5-3.el3.1.s390x.rpm a7d61c3643d31ac0db2f6b15d0ea996b texinfo-4.5-3.el3.1.s390x.rpm 566c653544cdb5e1a5eb82f6b67edb9c texinfo-debuginfo-4.5-3.el3.1.s390x.rpm x86_64: 544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm 8921c67695089cf7d6fb4bc7fe61c24a texinfo-4.5-3.el3.1.x86_64.rpm 5e7e98da194c722cee0ab2e1f05989b8 texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm cae389223d777d79c862b4672c75a9e1 texinfo-4.5-3.el3.1.src.rpm i386: 1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm 04bd5020018f6727b77fd8c2a9fb2588 texinfo-4.5-3.el3.1.i386.rpm 1ee197caad9a5c8fa930215a7c5ca9e6 texinfo-debuginfo-4.5-3.el3.1.i386.rpm x86_64: 544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm 8921c67695089cf7d6fb4bc7fe61c24a texinfo-4.5-3.el3.1.x86_64.rpm 5e7e98da194c722cee0ab2e1f05989b8 texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm cae389223d777d79c862b4672c75a9e1 texinfo-4.5-3.el3.1.src.rpm i386: 1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm 04bd5020018f6727b77fd8c2a9fb2588 texinfo-4.5-3.el3.1.i386.rpm 1ee197caad9a5c8fa930215a7c5ca9e6 texinfo-debuginfo-4.5-3.el3.1.i386.rpm ia64: 42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm 3fabad46614f61118bc29cffbd83df54 texinfo-4.5-3.el3.1.ia64.rpm d8bb2bd2fd7be72a8822e93b1372b625 texinfo-debuginfo-4.5-3.el3.1.ia64.rpm x86_64: 544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm 8921c67695089cf7d6fb4bc7fe61c24a texinfo-4.5-3.el3.1.x86_64.rpm 5e7e98da194c722cee0ab2e1f05989b8 texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm cae389223d777d79c862b4672c75a9e1 texinfo-4.5-3.el3.1.src.rpm i386: 1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm 04bd5020018f6727b77fd8c2a9fb2588 texinfo-4.5-3.el3.1.i386.rpm 1ee197caad9a5c8fa930215a7c5ca9e6 texinfo-debuginfo-4.5-3.el3.1.i386.rpm ia64: 42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm 3fabad46614f61118bc29cffbd83df54 texinfo-4.5-3.el3.1.ia64.rpm d8bb2bd2fd7be72a8822e93b1372b625 texinfo-debuginfo-4.5-3.el3.1.ia64.rpm x86_64: 544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm 8921c67695089cf7d6fb4bc7fe61c24a texinfo-4.5-3.el3.1.x86_64.rpm 5e7e98da194c722cee0ab2e1f05989b8 texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm c5fabea21ca9dbc20658e542dabf2922 texinfo-4.7-5.el4.2.src.rpm i386: 7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm 5f509002c109ce1a2b9876b60e7b1eee texinfo-4.7-5.el4.2.i386.rpm 11151582bace0b111ec2061041da9a01 texinfo-debuginfo-4.7-5.el4.2.i386.rpm ia64: 99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm 119c541a6cfe685fc2762e4718c772de texinfo-4.7-5.el4.2.ia64.rpm 17d075dc8887246a394f9bb699791d81 texinfo-debuginfo-4.7-5.el4.2.ia64.rpm ppc: 706a14c171a272ce82f3201364ec17a2 info-4.7-5.el4.2.ppc.rpm 1d1b035106a9889fa3bfa96f79a88248 texinfo-4.7-5.el4.2.ppc.rpm 52cc1d3e4c5fa6f2d745654706363d22 texinfo-debuginfo-4.7-5.el4.2.ppc.rpm s390: 1f1c0056ceed97e903f70f9583bce14a info-4.7-5.el4.2.s390.rpm d4170f862521f47487a88eae5f1c6946 texinfo-4.7-5.el4.2.s390.rpm 6eb45ee9e2bcf48289334e33c3b54846 texinfo-debuginfo-4.7-5.el4.2.s390.rpm s390x: f5ccba218def5a9c496ff4ff6a8177d2 info-4.7-5.el4.2.s390x.rpm bd3f9d50bb9855b8adeefe44ca7c0793 texinfo-4.7-5.el4.2.s390x.rpm d64aa22173ce1036c50a23748f835251 texinfo-debuginfo-4.7-5.el4.2.s390x.rpm x86_64: 8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm 33ec657749738e6737a569d75ffe79c3 texinfo-4.7-5.el4.2.x86_64.rpm d824601958b4d0b0961f5ea9c312bd9e texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm c5fabea21ca9dbc20658e542dabf2922 texinfo-4.7-5.el4.2.src.rpm i386: 7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm 5f509002c109ce1a2b9876b60e7b1eee texinfo-4.7-5.el4.2.i386.rpm 11151582bace0b111ec2061041da9a01 texinfo-debuginfo-4.7-5.el4.2.i386.rpm x86_64: 8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm 33ec657749738e6737a569d75ffe79c3 texinfo-4.7-5.el4.2.x86_64.rpm d824601958b4d0b0961f5ea9c312bd9e texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm c5fabea21ca9dbc20658e542dabf2922 texinfo-4.7-5.el4.2.src.rpm i386: 7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm 5f509002c109ce1a2b9876b60e7b1eee texinfo-4.7-5.el4.2.i386.rpm 11151582bace0b111ec2061041da9a01 texinfo-debuginfo-4.7-5.el4.2.i386.rpm ia64: 99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm 119c541a6cfe685fc2762e4718c772de texinfo-4.7-5.el4.2.ia64.rpm 17d075dc8887246a394f9bb699791d81 texinfo-debuginfo-4.7-5.el4.2.ia64.rpm x86_64: 8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm 33ec657749738e6737a569d75ffe79c3 texinfo-4.7-5.el4.2.x86_64.rpm d824601958b4d0b0961f5ea9c312bd9e texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm c5fabea21ca9dbc20658e542dabf2922 texinfo-4.7-5.el4.2.src.rpm i386: 7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm 5f509002c109ce1a2b9876b60e7b1eee texinfo-4.7-5.el4.2.i386.rpm 11151582bace0b111ec2061041da9a01 texinfo-debuginfo-4.7-5.el4.2.i386.rpm ia64: 99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm 119c541a6cfe685fc2762e4718c772de texinfo-4.7-5.el4.2.ia64.rpm 17d075dc8887246a394f9bb699791d81 texinfo-debuginfo-4.7-5.el4.2.ia64.rpm x86_64: 8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm 33ec657749738e6737a569d75ffe79c3 texinfo-4.7-5.el4.2.x86_64.rpm d824601958b4d0b0961f5ea9c312bd9e texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3011 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFUasrXlSAg2UNWIIRAuu8AJ4no9wzZGRpmkTPPhfLUWmg/2eK0gCfQwbG NFay9zOfrymBTUW99vUQs6w= =hBFC -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 8 16:39:04 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 8 Nov 2006 11:39:04 -0500 Subject: [RHSA-2006:0729-01] Moderate: ruby security update Message-ID: <200611081639.kA8Gd5lJ005236@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: ruby security update Advisory ID: RHSA-2006:0729-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0729.html Issue date: 2006-11-08 Updated on: 2006-11-08 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5467 - --------------------------------------------------------------------- 1. Summary: Updated ruby packages that fix a denial of service issue for the CGI instance are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Ruby is an interpreted scripting language for object-oriented programming. A flaw was discovered in the way Ruby's CGI module handles certain multipart/form-data MIME data. If a remote attacker sends a specially crafted multipart-form-data request, it is possible to cause the ruby CGI script to enter an infinite loop, causing a denial of service. (CVE-2006-5467) Users of Ruby should upgrade to these updated packages which contain backported patches and are not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. To use the Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 212237 - CVE-2006-5467 Ruby CGI multipart parsing DoS 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm da33f04add8f92b85398c097a6e1afe2 ruby-1.6.4-2.AS21.4.src.rpm i386: 03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm 559f16472af5d47d492d076e5f576fb0 ruby-1.6.4-2.AS21.4.i386.rpm d3a4d6865c09af74fcdd53113b558bb3 ruby-devel-1.6.4-2.AS21.4.i386.rpm d908d490a0d3a57a96ecfb62c9eb53fa ruby-docs-1.6.4-2.AS21.4.i386.rpm 6716140060e7050901f36db98f449121 ruby-libs-1.6.4-2.AS21.4.i386.rpm 1568989d2a32453150c6113e02342f23 ruby-tcltk-1.6.4-2.AS21.4.i386.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm da33f04add8f92b85398c097a6e1afe2 ruby-1.6.4-2.AS21.4.src.rpm i386: 03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm 559f16472af5d47d492d076e5f576fb0 ruby-1.6.4-2.AS21.4.i386.rpm d3a4d6865c09af74fcdd53113b558bb3 ruby-devel-1.6.4-2.AS21.4.i386.rpm d908d490a0d3a57a96ecfb62c9eb53fa ruby-docs-1.6.4-2.AS21.4.i386.rpm 6716140060e7050901f36db98f449121 ruby-libs-1.6.4-2.AS21.4.i386.rpm 1568989d2a32453150c6113e02342f23 ruby-tcltk-1.6.4-2.AS21.4.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm da33f04add8f92b85398c097a6e1afe2 ruby-1.6.4-2.AS21.4.src.rpm i386: 03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm 559f16472af5d47d492d076e5f576fb0 ruby-1.6.4-2.AS21.4.i386.rpm d3a4d6865c09af74fcdd53113b558bb3 ruby-devel-1.6.4-2.AS21.4.i386.rpm d908d490a0d3a57a96ecfb62c9eb53fa ruby-docs-1.6.4-2.AS21.4.i386.rpm 6716140060e7050901f36db98f449121 ruby-libs-1.6.4-2.AS21.4.i386.rpm 1568989d2a32453150c6113e02342f23 ruby-tcltk-1.6.4-2.AS21.4.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm eca0052ddce8bc444b0ed0f4daa97c08 ruby-1.6.8-9.EL3.8.src.rpm i386: b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm 685a1e2ccc3a94a89d6a8c0652eda247 ruby-1.6.8-9.EL3.8.i386.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 5f6fa5ef75eed97aeb47535f59c24cf1 ruby-devel-1.6.8-9.EL3.8.i386.rpm 1ea9a07cebaa322a31f3847d2e0a69cf ruby-docs-1.6.8-9.EL3.8.i386.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm ce7b0585a1bb6ec95e6a7ba29e6e72c5 ruby-mode-1.6.8-9.EL3.8.i386.rpm 237aa7d1789783e229b050f9c5af52a4 ruby-tcltk-1.6.8-9.EL3.8.i386.rpm ia64: a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm e242fcc5ba32b3d00be4810238376471 ruby-1.6.8-9.EL3.8.ia64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm f677dd674f161fcf49b38c17620dcbaf ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm d1f0c119cb0a22b2a103a1f5629c960a ruby-devel-1.6.8-9.EL3.8.ia64.rpm d2acb7e1bcb312a09952233169562b0c ruby-docs-1.6.8-9.EL3.8.ia64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 1d024a540d285437f1b12e680768a8a8 ruby-libs-1.6.8-9.EL3.8.ia64.rpm 3a103e5aa1a670ce7bae8296e01b042d ruby-mode-1.6.8-9.EL3.8.ia64.rpm d924d18b0631f96d11f25cbeb6b4c8e2 ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm ppc: 866683a3215130d535628afea3d067cb irb-1.6.8-9.EL3.8.ppc.rpm 5a93e383b8bf6e017e4981d32dff5977 ruby-1.6.8-9.EL3.8.ppc.rpm ce11871f57601915fb997afe51203cb7 ruby-debuginfo-1.6.8-9.EL3.8.ppc.rpm 047918d10246a726f41ce119824b289e ruby-debuginfo-1.6.8-9.EL3.8.ppc64.rpm cbec5c81375db8ccf58830f6561e4856 ruby-devel-1.6.8-9.EL3.8.ppc.rpm 46a242fe3e9b6414b3be61930b16ad2e ruby-docs-1.6.8-9.EL3.8.ppc.rpm 20242af919fdee83f3dedde6a23ae206 ruby-libs-1.6.8-9.EL3.8.ppc.rpm f2742498fcbe91c42daaa973b7a8d643 ruby-libs-1.6.8-9.EL3.8.ppc64.rpm a5838ed6e5b3a64fe2ed19c4b60bd7a9 ruby-mode-1.6.8-9.EL3.8.ppc.rpm 4df5200faa7579ec4544c9732db1712d ruby-tcltk-1.6.8-9.EL3.8.ppc.rpm s390: 805e7e94b9aea16518fdc9c0f7b54de4 irb-1.6.8-9.EL3.8.s390.rpm 9a8dfb118a771aab8a46805882f7d810 ruby-1.6.8-9.EL3.8.s390.rpm 7318bfe46cfe4a78bebd019e061afd56 ruby-debuginfo-1.6.8-9.EL3.8.s390.rpm 9512b4836f9f4885e990206237386534 ruby-devel-1.6.8-9.EL3.8.s390.rpm 9787466ca28e1cb911349dbed4d445a9 ruby-docs-1.6.8-9.EL3.8.s390.rpm 35a417a8272035f4235bc22be9b37ed0 ruby-libs-1.6.8-9.EL3.8.s390.rpm eda38660bd8734461ee1e1e2b0292388 ruby-mode-1.6.8-9.EL3.8.s390.rpm c23832c14cb5b26100cdd5d00decf092 ruby-tcltk-1.6.8-9.EL3.8.s390.rpm s390x: 88d994de226b7da4b2da72f459def426 irb-1.6.8-9.EL3.8.s390x.rpm b5c906ffcb09794210e113715c9aba09 ruby-1.6.8-9.EL3.8.s390x.rpm 7318bfe46cfe4a78bebd019e061afd56 ruby-debuginfo-1.6.8-9.EL3.8.s390.rpm 4df63e5e8add34ee3cafa2eac019f693 ruby-debuginfo-1.6.8-9.EL3.8.s390x.rpm 961d7de617203422fab50b80be20625f ruby-devel-1.6.8-9.EL3.8.s390x.rpm 9fb08ed816f919fb40337f44d2fae961 ruby-docs-1.6.8-9.EL3.8.s390x.rpm 35a417a8272035f4235bc22be9b37ed0 ruby-libs-1.6.8-9.EL3.8.s390.rpm 570893bdc62b196b498de7034ec7bd63 ruby-libs-1.6.8-9.EL3.8.s390x.rpm b2db7d1ba75dca965e62ff03f4d16639 ruby-mode-1.6.8-9.EL3.8.s390x.rpm d851b374670d53243eab5d1f6265003b ruby-tcltk-1.6.8-9.EL3.8.s390x.rpm x86_64: a41fea091e450a7558a2d7200aaf566c irb-1.6.8-9.EL3.8.x86_64.rpm 35df04fe195136a178bbf8a31a0a7200 ruby-1.6.8-9.EL3.8.x86_64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 10b72cabfa52537ce0157fbaefafb8f5 ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm 257cec5ad60d8e95f2ab6ba058d66081 ruby-devel-1.6.8-9.EL3.8.x86_64.rpm 3e5c1c18340363f530635716378b4945 ruby-docs-1.6.8-9.EL3.8.x86_64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 3285ba0ba282e3edf7be9c67712ea5e0 ruby-libs-1.6.8-9.EL3.8.x86_64.rpm 02539122beea941018a82360942b3111 ruby-mode-1.6.8-9.EL3.8.x86_64.rpm a8043f4ba3d9ce7404e0b4bbd85073ce ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm eca0052ddce8bc444b0ed0f4daa97c08 ruby-1.6.8-9.EL3.8.src.rpm i386: b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm 685a1e2ccc3a94a89d6a8c0652eda247 ruby-1.6.8-9.EL3.8.i386.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 5f6fa5ef75eed97aeb47535f59c24cf1 ruby-devel-1.6.8-9.EL3.8.i386.rpm 1ea9a07cebaa322a31f3847d2e0a69cf ruby-docs-1.6.8-9.EL3.8.i386.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm ce7b0585a1bb6ec95e6a7ba29e6e72c5 ruby-mode-1.6.8-9.EL3.8.i386.rpm 237aa7d1789783e229b050f9c5af52a4 ruby-tcltk-1.6.8-9.EL3.8.i386.rpm x86_64: a41fea091e450a7558a2d7200aaf566c irb-1.6.8-9.EL3.8.x86_64.rpm 35df04fe195136a178bbf8a31a0a7200 ruby-1.6.8-9.EL3.8.x86_64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 10b72cabfa52537ce0157fbaefafb8f5 ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm 257cec5ad60d8e95f2ab6ba058d66081 ruby-devel-1.6.8-9.EL3.8.x86_64.rpm 3e5c1c18340363f530635716378b4945 ruby-docs-1.6.8-9.EL3.8.x86_64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 3285ba0ba282e3edf7be9c67712ea5e0 ruby-libs-1.6.8-9.EL3.8.x86_64.rpm 02539122beea941018a82360942b3111 ruby-mode-1.6.8-9.EL3.8.x86_64.rpm a8043f4ba3d9ce7404e0b4bbd85073ce ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm eca0052ddce8bc444b0ed0f4daa97c08 ruby-1.6.8-9.EL3.8.src.rpm i386: b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm 685a1e2ccc3a94a89d6a8c0652eda247 ruby-1.6.8-9.EL3.8.i386.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 5f6fa5ef75eed97aeb47535f59c24cf1 ruby-devel-1.6.8-9.EL3.8.i386.rpm 1ea9a07cebaa322a31f3847d2e0a69cf ruby-docs-1.6.8-9.EL3.8.i386.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm ce7b0585a1bb6ec95e6a7ba29e6e72c5 ruby-mode-1.6.8-9.EL3.8.i386.rpm 237aa7d1789783e229b050f9c5af52a4 ruby-tcltk-1.6.8-9.EL3.8.i386.rpm ia64: a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm e242fcc5ba32b3d00be4810238376471 ruby-1.6.8-9.EL3.8.ia64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm f677dd674f161fcf49b38c17620dcbaf ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm d1f0c119cb0a22b2a103a1f5629c960a ruby-devel-1.6.8-9.EL3.8.ia64.rpm d2acb7e1bcb312a09952233169562b0c ruby-docs-1.6.8-9.EL3.8.ia64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 1d024a540d285437f1b12e680768a8a8 ruby-libs-1.6.8-9.EL3.8.ia64.rpm 3a103e5aa1a670ce7bae8296e01b042d ruby-mode-1.6.8-9.EL3.8.ia64.rpm d924d18b0631f96d11f25cbeb6b4c8e2 ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm x86_64: a41fea091e450a7558a2d7200aaf566c irb-1.6.8-9.EL3.8.x86_64.rpm 35df04fe195136a178bbf8a31a0a7200 ruby-1.6.8-9.EL3.8.x86_64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 10b72cabfa52537ce0157fbaefafb8f5 ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm 257cec5ad60d8e95f2ab6ba058d66081 ruby-devel-1.6.8-9.EL3.8.x86_64.rpm 3e5c1c18340363f530635716378b4945 ruby-docs-1.6.8-9.EL3.8.x86_64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 3285ba0ba282e3edf7be9c67712ea5e0 ruby-libs-1.6.8-9.EL3.8.x86_64.rpm 02539122beea941018a82360942b3111 ruby-mode-1.6.8-9.EL3.8.x86_64.rpm a8043f4ba3d9ce7404e0b4bbd85073ce ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm eca0052ddce8bc444b0ed0f4daa97c08 ruby-1.6.8-9.EL3.8.src.rpm i386: b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm 685a1e2ccc3a94a89d6a8c0652eda247 ruby-1.6.8-9.EL3.8.i386.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 5f6fa5ef75eed97aeb47535f59c24cf1 ruby-devel-1.6.8-9.EL3.8.i386.rpm 1ea9a07cebaa322a31f3847d2e0a69cf ruby-docs-1.6.8-9.EL3.8.i386.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm ce7b0585a1bb6ec95e6a7ba29e6e72c5 ruby-mode-1.6.8-9.EL3.8.i386.rpm 237aa7d1789783e229b050f9c5af52a4 ruby-tcltk-1.6.8-9.EL3.8.i386.rpm ia64: a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm e242fcc5ba32b3d00be4810238376471 ruby-1.6.8-9.EL3.8.ia64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm f677dd674f161fcf49b38c17620dcbaf ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm d1f0c119cb0a22b2a103a1f5629c960a ruby-devel-1.6.8-9.EL3.8.ia64.rpm d2acb7e1bcb312a09952233169562b0c ruby-docs-1.6.8-9.EL3.8.ia64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 1d024a540d285437f1b12e680768a8a8 ruby-libs-1.6.8-9.EL3.8.ia64.rpm 3a103e5aa1a670ce7bae8296e01b042d ruby-mode-1.6.8-9.EL3.8.ia64.rpm d924d18b0631f96d11f25cbeb6b4c8e2 ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm x86_64: a41fea091e450a7558a2d7200aaf566c irb-1.6.8-9.EL3.8.x86_64.rpm 35df04fe195136a178bbf8a31a0a7200 ruby-1.6.8-9.EL3.8.x86_64.rpm cfde0106dbbefdda79e27e1a2aebeafe ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm 10b72cabfa52537ce0157fbaefafb8f5 ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm 257cec5ad60d8e95f2ab6ba058d66081 ruby-devel-1.6.8-9.EL3.8.x86_64.rpm 3e5c1c18340363f530635716378b4945 ruby-docs-1.6.8-9.EL3.8.x86_64.rpm 141d13ceb9073452a45f5a0122aff48c ruby-libs-1.6.8-9.EL3.8.i386.rpm 3285ba0ba282e3edf7be9c67712ea5e0 ruby-libs-1.6.8-9.EL3.8.x86_64.rpm 02539122beea941018a82360942b3111 ruby-mode-1.6.8-9.EL3.8.x86_64.rpm a8043f4ba3d9ce7404e0b4bbd85073ce ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm 79a0839bc49b4954d3a6e8ba6448fce5 ruby-1.8.1-7.EL4.8.src.rpm i386: 17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm 84135ec3cf941c0786b0b94ff8b8ce49 ruby-1.8.1-7.EL4.8.i386.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 8a6b1a06c6937ce066b72a1ac9cd4067 ruby-devel-1.8.1-7.EL4.8.i386.rpm 7bb1cdebaf73798c5324b84da3b4ff3c ruby-docs-1.8.1-7.EL4.8.i386.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 05f985e7860daece4a8709dccda6214b ruby-mode-1.8.1-7.EL4.8.i386.rpm 38e62459fb4f9c96a14f67a612385c9a ruby-tcltk-1.8.1-7.EL4.8.i386.rpm ia64: 3ba797719ac856a9a32af725fa524343 irb-1.8.1-7.EL4.8.ia64.rpm e4c7a149c0ca0c16aa129d9908d27707 ruby-1.8.1-7.EL4.8.ia64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 7d46029096751904c8257f61df081206 ruby-debuginfo-1.8.1-7.EL4.8.ia64.rpm 03107196a8326d0dbf3b77aed76bf0a9 ruby-devel-1.8.1-7.EL4.8.ia64.rpm 64cb05eb1c5b8455f495db254cfea059 ruby-docs-1.8.1-7.EL4.8.ia64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 54a92920cc2753b3e09c11bd9bd418e6 ruby-libs-1.8.1-7.EL4.8.ia64.rpm 76ca52df8a3f6204b6e7462d82c3ca5d ruby-mode-1.8.1-7.EL4.8.ia64.rpm cfee61a676297f9c948482ea6cfdf327 ruby-tcltk-1.8.1-7.EL4.8.ia64.rpm ppc: b62ebb81d907646f2f1abf9e38321c8b irb-1.8.1-7.EL4.8.ppc.rpm 9193d4d2dda77cf671d63c78d712e278 ruby-1.8.1-7.EL4.8.ppc.rpm d38bee62a89060c45f244ce837c4ada3 ruby-debuginfo-1.8.1-7.EL4.8.ppc.rpm 46d26d36bf6dda1d2161668b63763f3d ruby-debuginfo-1.8.1-7.EL4.8.ppc64.rpm 96325b82a466fdfac1d4c500bfbcd7db ruby-devel-1.8.1-7.EL4.8.ppc.rpm 664fffe2d54ed85d28be82e0bb04cdc2 ruby-docs-1.8.1-7.EL4.8.ppc.rpm 08ad284e3e39251741412f2122e119ce ruby-libs-1.8.1-7.EL4.8.ppc.rpm f635833ff98ffbde26103e4cc72d8946 ruby-libs-1.8.1-7.EL4.8.ppc64.rpm 4086943969810d7724212c6b93c36aac ruby-mode-1.8.1-7.EL4.8.ppc.rpm 26418ed60f6805864ad34ae7a8e22d7a ruby-tcltk-1.8.1-7.EL4.8.ppc.rpm s390: 08f666e14511690c213a75cd6f802cb2 irb-1.8.1-7.EL4.8.s390.rpm 4d9bbaae8c4abf8d7e51f8e392548377 ruby-1.8.1-7.EL4.8.s390.rpm 9cefbd86d92dcaf5953a04cbd7415e1f ruby-debuginfo-1.8.1-7.EL4.8.s390.rpm b879874e3ab4f5ec0f3c113c44d4d701 ruby-devel-1.8.1-7.EL4.8.s390.rpm b8fe87c0e033369c782e8c20a3cb9a9f ruby-docs-1.8.1-7.EL4.8.s390.rpm 2337c99a80be0684eb65fcd6a0bb3d7f ruby-libs-1.8.1-7.EL4.8.s390.rpm 9ce34874770248c2e3430e0be1769af7 ruby-mode-1.8.1-7.EL4.8.s390.rpm c1437202b8bbba1ae063fa1c491ed7de ruby-tcltk-1.8.1-7.EL4.8.s390.rpm s390x: 93658817dde1423ea84b840a230d4677 irb-1.8.1-7.EL4.8.s390x.rpm 436b1730c80eafe80cfd2868f642d85e ruby-1.8.1-7.EL4.8.s390x.rpm 9cefbd86d92dcaf5953a04cbd7415e1f ruby-debuginfo-1.8.1-7.EL4.8.s390.rpm 372406df8dcf8ef45b180dca9f53947b ruby-debuginfo-1.8.1-7.EL4.8.s390x.rpm 6bd812620e92594ad55517ab1d36a9b7 ruby-devel-1.8.1-7.EL4.8.s390x.rpm 9633a2f5ab25b12af9c12cc850f53fc5 ruby-docs-1.8.1-7.EL4.8.s390x.rpm 2337c99a80be0684eb65fcd6a0bb3d7f ruby-libs-1.8.1-7.EL4.8.s390.rpm 892997fa3dbcaed8167d89aa700874d0 ruby-libs-1.8.1-7.EL4.8.s390x.rpm 18c633b9d39c7e1e0bf70c9ef3c7916c ruby-mode-1.8.1-7.EL4.8.s390x.rpm 703b2419b89fb75efd0e36ef2bea0649 ruby-tcltk-1.8.1-7.EL4.8.s390x.rpm x86_64: f90ab40469e260ce1e362ce345dd0783 irb-1.8.1-7.EL4.8.x86_64.rpm 0eef3d0bf1e36c21bbdb1fe90b2a164d ruby-1.8.1-7.EL4.8.x86_64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm e1ca7dc2948b567cd8ec699f8c129cdc ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm e68e89288eda0c91f8287cc080868f3b ruby-devel-1.8.1-7.EL4.8.x86_64.rpm 035dfd2e2bdd2a3931d68916f94013f6 ruby-docs-1.8.1-7.EL4.8.x86_64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm afb9170ccc4afc036fbba4da3e537d1c ruby-libs-1.8.1-7.EL4.8.x86_64.rpm 3f844cb4f8f32adddf8759b7a0acae32 ruby-mode-1.8.1-7.EL4.8.x86_64.rpm 062adee9f9259527cfd8960a821e76e5 ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm 79a0839bc49b4954d3a6e8ba6448fce5 ruby-1.8.1-7.EL4.8.src.rpm i386: 17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm 84135ec3cf941c0786b0b94ff8b8ce49 ruby-1.8.1-7.EL4.8.i386.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 8a6b1a06c6937ce066b72a1ac9cd4067 ruby-devel-1.8.1-7.EL4.8.i386.rpm 7bb1cdebaf73798c5324b84da3b4ff3c ruby-docs-1.8.1-7.EL4.8.i386.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 05f985e7860daece4a8709dccda6214b ruby-mode-1.8.1-7.EL4.8.i386.rpm 38e62459fb4f9c96a14f67a612385c9a ruby-tcltk-1.8.1-7.EL4.8.i386.rpm x86_64: f90ab40469e260ce1e362ce345dd0783 irb-1.8.1-7.EL4.8.x86_64.rpm 0eef3d0bf1e36c21bbdb1fe90b2a164d ruby-1.8.1-7.EL4.8.x86_64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm e1ca7dc2948b567cd8ec699f8c129cdc ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm e68e89288eda0c91f8287cc080868f3b ruby-devel-1.8.1-7.EL4.8.x86_64.rpm 035dfd2e2bdd2a3931d68916f94013f6 ruby-docs-1.8.1-7.EL4.8.x86_64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm afb9170ccc4afc036fbba4da3e537d1c ruby-libs-1.8.1-7.EL4.8.x86_64.rpm 3f844cb4f8f32adddf8759b7a0acae32 ruby-mode-1.8.1-7.EL4.8.x86_64.rpm 062adee9f9259527cfd8960a821e76e5 ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm 79a0839bc49b4954d3a6e8ba6448fce5 ruby-1.8.1-7.EL4.8.src.rpm i386: 17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm 84135ec3cf941c0786b0b94ff8b8ce49 ruby-1.8.1-7.EL4.8.i386.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 8a6b1a06c6937ce066b72a1ac9cd4067 ruby-devel-1.8.1-7.EL4.8.i386.rpm 7bb1cdebaf73798c5324b84da3b4ff3c ruby-docs-1.8.1-7.EL4.8.i386.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 05f985e7860daece4a8709dccda6214b ruby-mode-1.8.1-7.EL4.8.i386.rpm 38e62459fb4f9c96a14f67a612385c9a ruby-tcltk-1.8.1-7.EL4.8.i386.rpm ia64: 3ba797719ac856a9a32af725fa524343 irb-1.8.1-7.EL4.8.ia64.rpm e4c7a149c0ca0c16aa129d9908d27707 ruby-1.8.1-7.EL4.8.ia64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 7d46029096751904c8257f61df081206 ruby-debuginfo-1.8.1-7.EL4.8.ia64.rpm 03107196a8326d0dbf3b77aed76bf0a9 ruby-devel-1.8.1-7.EL4.8.ia64.rpm 64cb05eb1c5b8455f495db254cfea059 ruby-docs-1.8.1-7.EL4.8.ia64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 54a92920cc2753b3e09c11bd9bd418e6 ruby-libs-1.8.1-7.EL4.8.ia64.rpm 76ca52df8a3f6204b6e7462d82c3ca5d ruby-mode-1.8.1-7.EL4.8.ia64.rpm cfee61a676297f9c948482ea6cfdf327 ruby-tcltk-1.8.1-7.EL4.8.ia64.rpm x86_64: f90ab40469e260ce1e362ce345dd0783 irb-1.8.1-7.EL4.8.x86_64.rpm 0eef3d0bf1e36c21bbdb1fe90b2a164d ruby-1.8.1-7.EL4.8.x86_64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm e1ca7dc2948b567cd8ec699f8c129cdc ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm e68e89288eda0c91f8287cc080868f3b ruby-devel-1.8.1-7.EL4.8.x86_64.rpm 035dfd2e2bdd2a3931d68916f94013f6 ruby-docs-1.8.1-7.EL4.8.x86_64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm afb9170ccc4afc036fbba4da3e537d1c ruby-libs-1.8.1-7.EL4.8.x86_64.rpm 3f844cb4f8f32adddf8759b7a0acae32 ruby-mode-1.8.1-7.EL4.8.x86_64.rpm 062adee9f9259527cfd8960a821e76e5 ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm 79a0839bc49b4954d3a6e8ba6448fce5 ruby-1.8.1-7.EL4.8.src.rpm i386: 17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm 84135ec3cf941c0786b0b94ff8b8ce49 ruby-1.8.1-7.EL4.8.i386.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 8a6b1a06c6937ce066b72a1ac9cd4067 ruby-devel-1.8.1-7.EL4.8.i386.rpm 7bb1cdebaf73798c5324b84da3b4ff3c ruby-docs-1.8.1-7.EL4.8.i386.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 05f985e7860daece4a8709dccda6214b ruby-mode-1.8.1-7.EL4.8.i386.rpm 38e62459fb4f9c96a14f67a612385c9a ruby-tcltk-1.8.1-7.EL4.8.i386.rpm ia64: 3ba797719ac856a9a32af725fa524343 irb-1.8.1-7.EL4.8.ia64.rpm e4c7a149c0ca0c16aa129d9908d27707 ruby-1.8.1-7.EL4.8.ia64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm 7d46029096751904c8257f61df081206 ruby-debuginfo-1.8.1-7.EL4.8.ia64.rpm 03107196a8326d0dbf3b77aed76bf0a9 ruby-devel-1.8.1-7.EL4.8.ia64.rpm 64cb05eb1c5b8455f495db254cfea059 ruby-docs-1.8.1-7.EL4.8.ia64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm 54a92920cc2753b3e09c11bd9bd418e6 ruby-libs-1.8.1-7.EL4.8.ia64.rpm 76ca52df8a3f6204b6e7462d82c3ca5d ruby-mode-1.8.1-7.EL4.8.ia64.rpm cfee61a676297f9c948482ea6cfdf327 ruby-tcltk-1.8.1-7.EL4.8.ia64.rpm x86_64: f90ab40469e260ce1e362ce345dd0783 irb-1.8.1-7.EL4.8.x86_64.rpm 0eef3d0bf1e36c21bbdb1fe90b2a164d ruby-1.8.1-7.EL4.8.x86_64.rpm a8fb82bd7cc47506e2e9bfbfed365579 ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm e1ca7dc2948b567cd8ec699f8c129cdc ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm e68e89288eda0c91f8287cc080868f3b ruby-devel-1.8.1-7.EL4.8.x86_64.rpm 035dfd2e2bdd2a3931d68916f94013f6 ruby-docs-1.8.1-7.EL4.8.x86_64.rpm 4b254e60191d331a07aebf305edfb501 ruby-libs-1.8.1-7.EL4.8.i386.rpm afb9170ccc4afc036fbba4da3e537d1c ruby-libs-1.8.1-7.EL4.8.x86_64.rpm 3f844cb4f8f32adddf8759b7a0acae32 ruby-mode-1.8.1-7.EL4.8.x86_64.rpm 062adee9f9259527cfd8960a821e76e5 ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFUgghXlSAg2UNWIIRAtp4AKCU6CkvIJfJn95tjjPmFqNxk7PEXACePPuw eAJaV8Hxssxwj8U0CbBtO7M= =8EGj -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Nov 9 19:13:00 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 9 Nov 2006 14:13:00 -0500 Subject: [RHSA-2006:0726-01] Moderate: wireshark security update Message-ID: <200611091913.kA9JD0xS014975@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: wireshark security update Advisory ID: RHSA-2006:0726-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0726.html Issue date: 2006-11-09 Updated on: 2006-11-09 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-4574 CVE-2006-4805 CVE-2006-5468 CVE-2006-5469 CVE-2006-5740 - --------------------------------------------------------------------- 1. Summary: New Wireshark packages that fix various security vulnerabilities are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Wireshark is a program for monitoring network traffic. Several flaws were found in Wireshark's HTTP, WBXML, LDAP, and XOT protocol dissectors. Wireshark could crash or stop responding if it read a malformed packet off the network. (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469, CVE-2006-5740) A single NULL byte heap based buffer overflow was found in Wireshark's MIME Multipart dissector. Wireshark could crash or possibly execute arbitrary arbitrary code as the user running Wireshark. (CVE-2006-4574) Users of Wireshark should upgrade to these updated packages containing Wireshark version 0.99.4, which is not vulnerable to these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 211993 - CVE-2006-4574 Multiple Wireshark issues (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469, CVE-2006-5740) 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm 0044a0fccca9671b0733bacd5953e56b wireshark-0.99.4-AS21.1.src.rpm i386: b74bd883b6fa0bd1c1aaa87fefb94f23 wireshark-0.99.4-AS21.1.i386.rpm 4240d003577952c65242b04388b664e6 wireshark-gnome-0.99.4-AS21.1.i386.rpm ia64: 0b569ad061f9815fdb7a52959701852e wireshark-0.99.4-AS21.1.ia64.rpm f33a6afaf448d5be1a91da35a2699b41 wireshark-gnome-0.99.4-AS21.1.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm 0044a0fccca9671b0733bacd5953e56b wireshark-0.99.4-AS21.1.src.rpm ia64: 0b569ad061f9815fdb7a52959701852e wireshark-0.99.4-AS21.1.ia64.rpm f33a6afaf448d5be1a91da35a2699b41 wireshark-gnome-0.99.4-AS21.1.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm 0044a0fccca9671b0733bacd5953e56b wireshark-0.99.4-AS21.1.src.rpm i386: b74bd883b6fa0bd1c1aaa87fefb94f23 wireshark-0.99.4-AS21.1.i386.rpm 4240d003577952c65242b04388b664e6 wireshark-gnome-0.99.4-AS21.1.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/RHEL/SRPMS/wireshark-0.99.4-AS21.1.src.rpm 0044a0fccca9671b0733bacd5953e56b wireshark-0.99.4-AS21.1.src.rpm i386: b74bd883b6fa0bd1c1aaa87fefb94f23 wireshark-0.99.4-AS21.1.i386.rpm 4240d003577952c65242b04388b664e6 wireshark-gnome-0.99.4-AS21.1.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm 4d59c60c99a374f67ffcb7392783549a wireshark-0.99.4-EL3.1.src.rpm i386: f71c6c6b2c855f5576e907aeef50191e wireshark-0.99.4-EL3.1.i386.rpm 35a9915c3ae5a22ab1a76bd5d6d7c422 wireshark-debuginfo-0.99.4-EL3.1.i386.rpm 6861386ad3bbd70399012c74d7509e71 wireshark-gnome-0.99.4-EL3.1.i386.rpm ia64: 03e212be1a5dc7434628fa234c31bfc6 wireshark-0.99.4-EL3.1.ia64.rpm 72b5a6647025addf98b7699a865834fc wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm 5744bab221aeb6f132e1038c6690347a wireshark-gnome-0.99.4-EL3.1.ia64.rpm ppc: f20fd0fe2fd6aa43d504a7c237b6ee17 wireshark-0.99.4-EL3.1.ppc.rpm fc5232d9c54292e069522e3b6a2bec97 wireshark-debuginfo-0.99.4-EL3.1.ppc.rpm 5c901cb605c1ce1868af805df479217f wireshark-gnome-0.99.4-EL3.1.ppc.rpm s390: 01b7661dfef18533ba69210e66dc0b73 wireshark-0.99.4-EL3.1.s390.rpm f37b3d3d51c5043fedc31d66dc197770 wireshark-debuginfo-0.99.4-EL3.1.s390.rpm 918a15ce4e05fe2be3556ed1e62c7d05 wireshark-gnome-0.99.4-EL3.1.s390.rpm s390x: 8c93a7af1347075dbb663fcd26e2741d wireshark-0.99.4-EL3.1.s390x.rpm 87229e0ccd2cd2d9c4402b388f4546c8 wireshark-debuginfo-0.99.4-EL3.1.s390x.rpm f44b0ee5d41d4ecd0622210fcf0ef6f4 wireshark-gnome-0.99.4-EL3.1.s390x.rpm x86_64: 7bed2f6949e0764ecbd1363a69383b09 wireshark-0.99.4-EL3.1.x86_64.rpm 3d843711818a31fdc2a53b6e68f5dd1b wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm 41685c568cb33f8a98648ca637a2d7a4 wireshark-gnome-0.99.4-EL3.1.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm 4d59c60c99a374f67ffcb7392783549a wireshark-0.99.4-EL3.1.src.rpm i386: f71c6c6b2c855f5576e907aeef50191e wireshark-0.99.4-EL3.1.i386.rpm 35a9915c3ae5a22ab1a76bd5d6d7c422 wireshark-debuginfo-0.99.4-EL3.1.i386.rpm 6861386ad3bbd70399012c74d7509e71 wireshark-gnome-0.99.4-EL3.1.i386.rpm x86_64: 7bed2f6949e0764ecbd1363a69383b09 wireshark-0.99.4-EL3.1.x86_64.rpm 3d843711818a31fdc2a53b6e68f5dd1b wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm 41685c568cb33f8a98648ca637a2d7a4 wireshark-gnome-0.99.4-EL3.1.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm 4d59c60c99a374f67ffcb7392783549a wireshark-0.99.4-EL3.1.src.rpm i386: f71c6c6b2c855f5576e907aeef50191e wireshark-0.99.4-EL3.1.i386.rpm 35a9915c3ae5a22ab1a76bd5d6d7c422 wireshark-debuginfo-0.99.4-EL3.1.i386.rpm 6861386ad3bbd70399012c74d7509e71 wireshark-gnome-0.99.4-EL3.1.i386.rpm ia64: 03e212be1a5dc7434628fa234c31bfc6 wireshark-0.99.4-EL3.1.ia64.rpm 72b5a6647025addf98b7699a865834fc wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm 5744bab221aeb6f132e1038c6690347a wireshark-gnome-0.99.4-EL3.1.ia64.rpm x86_64: 7bed2f6949e0764ecbd1363a69383b09 wireshark-0.99.4-EL3.1.x86_64.rpm 3d843711818a31fdc2a53b6e68f5dd1b wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm 41685c568cb33f8a98648ca637a2d7a4 wireshark-gnome-0.99.4-EL3.1.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/RHEL/SRPMS/wireshark-0.99.4-EL3.1.src.rpm 4d59c60c99a374f67ffcb7392783549a wireshark-0.99.4-EL3.1.src.rpm i386: f71c6c6b2c855f5576e907aeef50191e wireshark-0.99.4-EL3.1.i386.rpm 35a9915c3ae5a22ab1a76bd5d6d7c422 wireshark-debuginfo-0.99.4-EL3.1.i386.rpm 6861386ad3bbd70399012c74d7509e71 wireshark-gnome-0.99.4-EL3.1.i386.rpm ia64: 03e212be1a5dc7434628fa234c31bfc6 wireshark-0.99.4-EL3.1.ia64.rpm 72b5a6647025addf98b7699a865834fc wireshark-debuginfo-0.99.4-EL3.1.ia64.rpm 5744bab221aeb6f132e1038c6690347a wireshark-gnome-0.99.4-EL3.1.ia64.rpm x86_64: 7bed2f6949e0764ecbd1363a69383b09 wireshark-0.99.4-EL3.1.x86_64.rpm 3d843711818a31fdc2a53b6e68f5dd1b wireshark-debuginfo-0.99.4-EL3.1.x86_64.rpm 41685c568cb33f8a98648ca637a2d7a4 wireshark-gnome-0.99.4-EL3.1.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm b1a38e3fa8fd9c7c48a0656379ab7d8f wireshark-0.99.4-EL4.1.src.rpm i386: c928c01ee33bc8bb911a7b0cae309211 wireshark-0.99.4-EL4.1.i386.rpm d741948a5eab62bc83e4355e1dd7833a wireshark-debuginfo-0.99.4-EL4.1.i386.rpm 129275da7e12c989135c107493bfd1b6 wireshark-gnome-0.99.4-EL4.1.i386.rpm ia64: 13015d70892b94b5c1ef57ad6c3d2a3e wireshark-0.99.4-EL4.1.ia64.rpm eb2225ef824146be3c9fbfa65e79898e wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm 9d3e24a1f93e3439817eae3403293ed6 wireshark-gnome-0.99.4-EL4.1.ia64.rpm ppc: b9b57ad476bf11236cc17db38c80011a wireshark-0.99.4-EL4.1.ppc.rpm 18b660267144802a5a4a63201368ece6 wireshark-debuginfo-0.99.4-EL4.1.ppc.rpm 5c8e0feb48e0b59a7ee7db132f2d0d0d wireshark-gnome-0.99.4-EL4.1.ppc.rpm s390: 2ee68666a5c43132ba15d72d6edcd40f wireshark-0.99.4-EL4.1.s390.rpm 74c6c26f4e51ba06f63eab2613c8ab2e wireshark-debuginfo-0.99.4-EL4.1.s390.rpm a0fe55b1d72438d52249191450eb833c wireshark-gnome-0.99.4-EL4.1.s390.rpm s390x: 807c2940f8091242fe13e6278ec7b4b2 wireshark-0.99.4-EL4.1.s390x.rpm 903b1eb1e5d20288be64df9639ac5352 wireshark-debuginfo-0.99.4-EL4.1.s390x.rpm 005596f5c35bcef053c923be315a0610 wireshark-gnome-0.99.4-EL4.1.s390x.rpm x86_64: f6e29f056b7b6ec894ffa15f1e3c28a9 wireshark-0.99.4-EL4.1.x86_64.rpm 4041f21163382e20847cd2a1fa18bb1b wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm 775d4bd277c4a86edf54c7b87c15f167 wireshark-gnome-0.99.4-EL4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm b1a38e3fa8fd9c7c48a0656379ab7d8f wireshark-0.99.4-EL4.1.src.rpm i386: c928c01ee33bc8bb911a7b0cae309211 wireshark-0.99.4-EL4.1.i386.rpm d741948a5eab62bc83e4355e1dd7833a wireshark-debuginfo-0.99.4-EL4.1.i386.rpm 129275da7e12c989135c107493bfd1b6 wireshark-gnome-0.99.4-EL4.1.i386.rpm x86_64: f6e29f056b7b6ec894ffa15f1e3c28a9 wireshark-0.99.4-EL4.1.x86_64.rpm 4041f21163382e20847cd2a1fa18bb1b wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm 775d4bd277c4a86edf54c7b87c15f167 wireshark-gnome-0.99.4-EL4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm b1a38e3fa8fd9c7c48a0656379ab7d8f wireshark-0.99.4-EL4.1.src.rpm i386: c928c01ee33bc8bb911a7b0cae309211 wireshark-0.99.4-EL4.1.i386.rpm d741948a5eab62bc83e4355e1dd7833a wireshark-debuginfo-0.99.4-EL4.1.i386.rpm 129275da7e12c989135c107493bfd1b6 wireshark-gnome-0.99.4-EL4.1.i386.rpm ia64: 13015d70892b94b5c1ef57ad6c3d2a3e wireshark-0.99.4-EL4.1.ia64.rpm eb2225ef824146be3c9fbfa65e79898e wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm 9d3e24a1f93e3439817eae3403293ed6 wireshark-gnome-0.99.4-EL4.1.ia64.rpm x86_64: f6e29f056b7b6ec894ffa15f1e3c28a9 wireshark-0.99.4-EL4.1.x86_64.rpm 4041f21163382e20847cd2a1fa18bb1b wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm 775d4bd277c4a86edf54c7b87c15f167 wireshark-gnome-0.99.4-EL4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/RHEL/SRPMS/wireshark-0.99.4-EL4.1.src.rpm b1a38e3fa8fd9c7c48a0656379ab7d8f wireshark-0.99.4-EL4.1.src.rpm i386: c928c01ee33bc8bb911a7b0cae309211 wireshark-0.99.4-EL4.1.i386.rpm d741948a5eab62bc83e4355e1dd7833a wireshark-debuginfo-0.99.4-EL4.1.i386.rpm 129275da7e12c989135c107493bfd1b6 wireshark-gnome-0.99.4-EL4.1.i386.rpm ia64: 13015d70892b94b5c1ef57ad6c3d2a3e wireshark-0.99.4-EL4.1.ia64.rpm eb2225ef824146be3c9fbfa65e79898e wireshark-debuginfo-0.99.4-EL4.1.ia64.rpm 9d3e24a1f93e3439817eae3403293ed6 wireshark-gnome-0.99.4-EL4.1.ia64.rpm x86_64: f6e29f056b7b6ec894ffa15f1e3c28a9 wireshark-0.99.4-EL4.1.x86_64.rpm 4041f21163382e20847cd2a1fa18bb1b wireshark-debuginfo-0.99.4-EL4.1.x86_64.rpm 775d4bd277c4a86edf54c7b87c15f167 wireshark-gnome-0.99.4-EL4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFU32pXlSAg2UNWIIRAn8ZAJ9SdULy0YBgf5azB2lgH2HbfpecfwCfc7Ly SpCUFYkaaMy8zgFm41ldlac= =OPMj -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Nov 10 09:11:03 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Fri, 10 Nov 2006 04:11:03 -0500 Subject: [RHSA-2006:0731-01] Important: php security update Message-ID: <200611100911.kAA9BBQ9002335@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: php security update Advisory ID: RHSA-2006:0731-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0731.html Issue date: 2006-11-10 Updated on: 2006-11-10 Product: Red Hat Application Stack CVE Names: CVE-2006-5465 - --------------------------------------------------------------------- 1. Summary: Updated PHP packages that fix a security issue are now available for the Red Hat Application Stack. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64 Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64 3. Problem description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. The Hardened-PHP Project discovered an overflow in the PHP htmlentities() and htmlspecialchars() routines. If a PHP script used the vulnerable functions to parse UTF-8 data, a remote attacker sending a carefully crafted request could trigger the overflow and potentially execute arbitrary code as the 'apache' user. (CVE-2006-5465) Users of PHP should upgrade to these updated packages which contain a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 213644 - CVE-2006-5465 PHP buffer overflow 6. RPMs required: Red Hat Application Stack v1 for Enterprise Linux AS (v.4): SRPMS: ftp://updates.redhat.com/4AS-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.5.src.rpm 9161a1d8e9bce699d4bd831b9b0ca06f php-5.1.4-1.el4s1.5.src.rpm i386: 83947aee60a8d3ee50e440de5ab47fd0 php-5.1.4-1.el4s1.5.i386.rpm 13ae4bedc7e1687f5b6e49cfa778268c php-bcmath-5.1.4-1.el4s1.5.i386.rpm 0acb5aeb696fae4b66613b0069498b43 php-dba-5.1.4-1.el4s1.5.i386.rpm baf8296a4ef6ca6bd58fa435b610ad38 php-debuginfo-5.1.4-1.el4s1.5.i386.rpm 50e3d2f7054f9c06c1ed189859a263c7 php-devel-5.1.4-1.el4s1.5.i386.rpm f28e19c9cf8f2862a5e7b5473646ad4c php-gd-5.1.4-1.el4s1.5.i386.rpm bbfb6117572d65c5ddef5867a1ba2602 php-imap-5.1.4-1.el4s1.5.i386.rpm e630f9ec2a88f94de7cffedbb69dc13f php-ldap-5.1.4-1.el4s1.5.i386.rpm 86628677256e0dcf96d5e5f1b6782e4b php-mbstring-5.1.4-1.el4s1.5.i386.rpm 0fe958c2a351bb83a612e62ec233adc4 php-mysql-5.1.4-1.el4s1.5.i386.rpm bf4c8581463c09a64e95aa9fb1bc7541 php-ncurses-5.1.4-1.el4s1.5.i386.rpm a3f61f9b1a3aaa1ae45a17609e3a883d php-odbc-5.1.4-1.el4s1.5.i386.rpm 2776adfdc5b395a055e8c678cba4fc6e php-pdo-5.1.4-1.el4s1.5.i386.rpm 2fae4d10a2a18db6e1b30d7eb3cae8ad php-pgsql-5.1.4-1.el4s1.5.i386.rpm d784de802fe900fe0f03cf7bfe2432a5 php-snmp-5.1.4-1.el4s1.5.i386.rpm 5b97be5e2b5de8ed19950e284a0410d0 php-soap-5.1.4-1.el4s1.5.i386.rpm f1bbc1d5bdc903b9d469ee1fc9993954 php-xml-5.1.4-1.el4s1.5.i386.rpm ec864278247fe343b014e736b92fe393 php-xmlrpc-5.1.4-1.el4s1.5.i386.rpm x86_64: 6db081a10dfa5af39e2f2f150b3c91b7 php-5.1.4-1.el4s1.5.x86_64.rpm 0f847444a2c2b9e2efa63b6430a2d1a2 php-bcmath-5.1.4-1.el4s1.5.x86_64.rpm 913527609e55127c5a62fa74ae7a055a php-dba-5.1.4-1.el4s1.5.x86_64.rpm 6715be4d78de845a1c901d33d2a64a31 php-debuginfo-5.1.4-1.el4s1.5.x86_64.rpm f7e197b2b1507513b0d2fe10f9222749 php-devel-5.1.4-1.el4s1.5.x86_64.rpm c0214169b8fbd802ab60d69ad7e8cdbf php-gd-5.1.4-1.el4s1.5.x86_64.rpm 0073cb2971941a6f48b1d6d2ff9d8463 php-imap-5.1.4-1.el4s1.5.x86_64.rpm 32139845801f794850ef3f9d5168e14c php-ldap-5.1.4-1.el4s1.5.x86_64.rpm 88a355fa5d7cab6dd63e16014d2667b9 php-mbstring-5.1.4-1.el4s1.5.x86_64.rpm 6dd28379b47bf167b72c6d266fdd9ad7 php-mysql-5.1.4-1.el4s1.5.x86_64.rpm 14c241ac5172c06eb6e61103932a3e2e php-ncurses-5.1.4-1.el4s1.5.x86_64.rpm c3a70245150763eb9244a19206f6cbe5 php-odbc-5.1.4-1.el4s1.5.x86_64.rpm a8616a5c2c84273ba6932aa8b93d5d72 php-pdo-5.1.4-1.el4s1.5.x86_64.rpm be110a73781f9d4856d020d9e2c84415 php-pgsql-5.1.4-1.el4s1.5.x86_64.rpm 4a6ad0570e308e421351af1cb55ac3a3 php-snmp-5.1.4-1.el4s1.5.x86_64.rpm ab3ec9bf114ad466aeffb5be74f59bc5 php-soap-5.1.4-1.el4s1.5.x86_64.rpm 4453298b314c8bc9cfc8840f25037ac7 php-xml-5.1.4-1.el4s1.5.x86_64.rpm a4cc0023fa194029b7fc57f295419b3b php-xmlrpc-5.1.4-1.el4s1.5.x86_64.rpm Red Hat Application Stack v1 for Enterprise Linux ES (v.4): SRPMS: ftp://updates.redhat.com/4ES-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.5.src.rpm 9161a1d8e9bce699d4bd831b9b0ca06f php-5.1.4-1.el4s1.5.src.rpm i386: 83947aee60a8d3ee50e440de5ab47fd0 php-5.1.4-1.el4s1.5.i386.rpm 13ae4bedc7e1687f5b6e49cfa778268c php-bcmath-5.1.4-1.el4s1.5.i386.rpm 0acb5aeb696fae4b66613b0069498b43 php-dba-5.1.4-1.el4s1.5.i386.rpm baf8296a4ef6ca6bd58fa435b610ad38 php-debuginfo-5.1.4-1.el4s1.5.i386.rpm 50e3d2f7054f9c06c1ed189859a263c7 php-devel-5.1.4-1.el4s1.5.i386.rpm f28e19c9cf8f2862a5e7b5473646ad4c php-gd-5.1.4-1.el4s1.5.i386.rpm bbfb6117572d65c5ddef5867a1ba2602 php-imap-5.1.4-1.el4s1.5.i386.rpm e630f9ec2a88f94de7cffedbb69dc13f php-ldap-5.1.4-1.el4s1.5.i386.rpm 86628677256e0dcf96d5e5f1b6782e4b php-mbstring-5.1.4-1.el4s1.5.i386.rpm 0fe958c2a351bb83a612e62ec233adc4 php-mysql-5.1.4-1.el4s1.5.i386.rpm bf4c8581463c09a64e95aa9fb1bc7541 php-ncurses-5.1.4-1.el4s1.5.i386.rpm a3f61f9b1a3aaa1ae45a17609e3a883d php-odbc-5.1.4-1.el4s1.5.i386.rpm 2776adfdc5b395a055e8c678cba4fc6e php-pdo-5.1.4-1.el4s1.5.i386.rpm 2fae4d10a2a18db6e1b30d7eb3cae8ad php-pgsql-5.1.4-1.el4s1.5.i386.rpm d784de802fe900fe0f03cf7bfe2432a5 php-snmp-5.1.4-1.el4s1.5.i386.rpm 5b97be5e2b5de8ed19950e284a0410d0 php-soap-5.1.4-1.el4s1.5.i386.rpm f1bbc1d5bdc903b9d469ee1fc9993954 php-xml-5.1.4-1.el4s1.5.i386.rpm ec864278247fe343b014e736b92fe393 php-xmlrpc-5.1.4-1.el4s1.5.i386.rpm x86_64: 6db081a10dfa5af39e2f2f150b3c91b7 php-5.1.4-1.el4s1.5.x86_64.rpm 0f847444a2c2b9e2efa63b6430a2d1a2 php-bcmath-5.1.4-1.el4s1.5.x86_64.rpm 913527609e55127c5a62fa74ae7a055a php-dba-5.1.4-1.el4s1.5.x86_64.rpm 6715be4d78de845a1c901d33d2a64a31 php-debuginfo-5.1.4-1.el4s1.5.x86_64.rpm f7e197b2b1507513b0d2fe10f9222749 php-devel-5.1.4-1.el4s1.5.x86_64.rpm c0214169b8fbd802ab60d69ad7e8cdbf php-gd-5.1.4-1.el4s1.5.x86_64.rpm 0073cb2971941a6f48b1d6d2ff9d8463 php-imap-5.1.4-1.el4s1.5.x86_64.rpm 32139845801f794850ef3f9d5168e14c php-ldap-5.1.4-1.el4s1.5.x86_64.rpm 88a355fa5d7cab6dd63e16014d2667b9 php-mbstring-5.1.4-1.el4s1.5.x86_64.rpm 6dd28379b47bf167b72c6d266fdd9ad7 php-mysql-5.1.4-1.el4s1.5.x86_64.rpm 14c241ac5172c06eb6e61103932a3e2e php-ncurses-5.1.4-1.el4s1.5.x86_64.rpm c3a70245150763eb9244a19206f6cbe5 php-odbc-5.1.4-1.el4s1.5.x86_64.rpm a8616a5c2c84273ba6932aa8b93d5d72 php-pdo-5.1.4-1.el4s1.5.x86_64.rpm be110a73781f9d4856d020d9e2c84415 php-pgsql-5.1.4-1.el4s1.5.x86_64.rpm 4a6ad0570e308e421351af1cb55ac3a3 php-snmp-5.1.4-1.el4s1.5.x86_64.rpm ab3ec9bf114ad466aeffb5be74f59bc5 php-soap-5.1.4-1.el4s1.5.x86_64.rpm 4453298b314c8bc9cfc8840f25037ac7 php-xml-5.1.4-1.el4s1.5.x86_64.rpm a4cc0023fa194029b7fc57f295419b3b php-xmlrpc-5.1.4-1.el4s1.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465 http://www.hardened-php.net/advisory_132006.138.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFVEHpXlSAg2UNWIIRApwlAJkBQS+/krcnKQUca2fm9j5b526VFgCfeAEu nGnQVWdWKo5miIgKowRcKFc= =Whe1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 15 14:50:41 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Nov 2006 09:50:41 -0500 Subject: [RHSA-2006:0719-01] Moderate: nss_ldap security update Message-ID: <200611151450.kAFEogaj012829@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: nss_ldap security update Advisory ID: RHSA-2006:0719-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0719.html Issue date: 2006-11-15 Updated on: 2006-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5170 - --------------------------------------------------------------------- 1. Summary: Updated nss_ldap packages that fix a security flaw are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: nss_ldap is a set of C library extensions that allow X.500 and LDAP directory servers to be used as primary sources for aliases, ethers, groups, hosts, networks, protocols, users, RPCs, services, and shadow passwords. A flaw was found in the way nss_ldap handled a PasswordPolicyResponse control sent by an LDAP server. If an LDAP server responded to an authentication request with a PasswordPolicyResponse control, it was possible for an application using nss_ldap to improperly authenticate certain users. (CVE-2006-5170) This flaw was only exploitable within applications which did not properly process nss_ldap error messages. Only xscreensaver is currently known to exhibit this behavior. All users of nss_ldap should upgrade to these updated packages, which contain a backported patch that resolves this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 207286 - CVE-2006-5170 When using LDAP for authentication, xscreensaver allows access if account locked out. 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/nss_ldap-226-17.src.rpm 8fdad6a352014e9c95f6640896bf91dd nss_ldap-226-17.src.rpm i386: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm ia64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm a8cc0cd2d3bd8f2fa916b8f50506dbfa nss_ldap-226-17.ia64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm 244bcce1538dc5537b860324b219ef3e nss_ldap-debuginfo-226-17.ia64.rpm ppc: 8fe0c5612ddac345de98d98daf3b1f47 nss_ldap-226-17.ppc.rpm fef89f4ddf2879df5d8b3cad563610dc nss_ldap-226-17.ppc64.rpm 31738b28daabe162736517dcee208011 nss_ldap-debuginfo-226-17.ppc.rpm 88cc4161fb0d1be7e5008a57dc9d614f nss_ldap-debuginfo-226-17.ppc64.rpm s390: 07f25516c0a7c24c8119f440f4c1fdf0 nss_ldap-226-17.s390.rpm aebc40eeef7e7277342dc5c7ae6e8a39 nss_ldap-debuginfo-226-17.s390.rpm s390x: 07f25516c0a7c24c8119f440f4c1fdf0 nss_ldap-226-17.s390.rpm e193a588cce944b5fa2a3feb01737b61 nss_ldap-226-17.s390x.rpm aebc40eeef7e7277342dc5c7ae6e8a39 nss_ldap-debuginfo-226-17.s390.rpm 03545e67b2137ebd7a27162b009a8f26 nss_ldap-debuginfo-226-17.s390x.rpm x86_64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 804dba9f8720306da14615b1f353e31d nss_ldap-226-17.x86_64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm e4fd474865ccdfd5907047d6bd0ccdac nss_ldap-debuginfo-226-17.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/nss_ldap-226-17.src.rpm 8fdad6a352014e9c95f6640896bf91dd nss_ldap-226-17.src.rpm i386: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm x86_64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 804dba9f8720306da14615b1f353e31d nss_ldap-226-17.x86_64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm e4fd474865ccdfd5907047d6bd0ccdac nss_ldap-debuginfo-226-17.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/nss_ldap-226-17.src.rpm 8fdad6a352014e9c95f6640896bf91dd nss_ldap-226-17.src.rpm i386: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm ia64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm a8cc0cd2d3bd8f2fa916b8f50506dbfa nss_ldap-226-17.ia64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm 244bcce1538dc5537b860324b219ef3e nss_ldap-debuginfo-226-17.ia64.rpm x86_64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 804dba9f8720306da14615b1f353e31d nss_ldap-226-17.x86_64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm e4fd474865ccdfd5907047d6bd0ccdac nss_ldap-debuginfo-226-17.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/nss_ldap-226-17.src.rpm 8fdad6a352014e9c95f6640896bf91dd nss_ldap-226-17.src.rpm i386: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm ia64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm a8cc0cd2d3bd8f2fa916b8f50506dbfa nss_ldap-226-17.ia64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm 244bcce1538dc5537b860324b219ef3e nss_ldap-debuginfo-226-17.ia64.rpm x86_64: f2728f30aeb7e78623aae9265fae7369 nss_ldap-226-17.i386.rpm 804dba9f8720306da14615b1f353e31d nss_ldap-226-17.x86_64.rpm 93c6349f5bd8880e6be2af40e4edcda6 nss_ldap-debuginfo-226-17.i386.rpm e4fd474865ccdfd5907047d6bd0ccdac nss_ldap-debuginfo-226-17.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170 http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFWyk/XlSAg2UNWIIRAkyNAKCEWyNMAVsLvxy6F2yusbmLnCMZXACghhQf +qXzCNXztzj+LmKUHehw7pQ= =fN3P -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 15 14:51:03 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Nov 2006 09:51:03 -0500 Subject: [RHSA-2006:0738-01] Low: openssh security update Message-ID: <200611151451.kAFEp3kE012840@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: openssh security update Advisory ID: RHSA-2006:0738-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0738.html Issue date: 2006-11-15 Updated on: 2006-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5794 - --------------------------------------------------------------------- 1. Summary: Updated openssh packages that fix an authentication flaw are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. This package includes the core files necessary for both the OpenSSH client and server. An authentication flaw was found in OpenSSH's privilege separation monitor. If it ever becomes possible to alter the behavior of the unprivileged process when OpenSSH is using privilege separation, an attacker may then be able to login without possessing proper credentials. (CVE-2006-5794) Please note that this flaw by itself poses no direct threat to OpenSSH users. Without another security flaw that could allow an attacker to alter the behavior of OpenSSH's unprivileged process, this flaw cannot be exploited. There are currently no known flaws to exploit this behavior. However, we have decided to issue this erratum to fix this flaw to reduce the security impact if an unprivileged process flaw is ever found. Users of openssh should upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 214640 - CVE-2006-5794 OpenSSH privilege separation flaw 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm ppc: 74d7a40819ac28ffe57b4d0358637aa5 openssh-3.6.1p2-33.30.13.ppc.rpm fb1b5891efc8fb9db26f989b48f7df9f openssh-askpass-3.6.1p2-33.30.13.ppc.rpm 30c4c779e67f9f140c1ba818d16b3389 openssh-askpass-gnome-3.6.1p2-33.30.13.ppc.rpm 42654616ea74a154c8ec943ce0c99ced openssh-clients-3.6.1p2-33.30.13.ppc.rpm 9df1c1ed2d66127bf491c531f7b3a569 openssh-debuginfo-3.6.1p2-33.30.13.ppc.rpm dfca8ed1c115ea29121a6a75852d32a7 openssh-server-3.6.1p2-33.30.13.ppc.rpm s390: 047c99c9d1f0a8302f3c0a751da3f99a openssh-3.6.1p2-33.30.13.s390.rpm 2dab72bc1e5f9f54b4e9caf201f9f617 openssh-askpass-3.6.1p2-33.30.13.s390.rpm 1dd2d0fdf4f8abf1b7fb839ff611dff1 openssh-askpass-gnome-3.6.1p2-33.30.13.s390.rpm fda4dabc8b23e7f860766f8412b7abf7 openssh-clients-3.6.1p2-33.30.13.s390.rpm 78e29572db8ea19ed2e6fd06beb00d14 openssh-debuginfo-3.6.1p2-33.30.13.s390.rpm fccc35c776978fe2654e7fbba3461dbf openssh-server-3.6.1p2-33.30.13.s390.rpm s390x: e92b4ce6f01fca8daca17c7787253ce6 openssh-3.6.1p2-33.30.13.s390x.rpm b600a2739c93ecdb6e43821d1bafe16f openssh-askpass-3.6.1p2-33.30.13.s390x.rpm 56bb8de4d2423ee720bbfea87274a40e openssh-askpass-gnome-3.6.1p2-33.30.13.s390x.rpm 5a4a37e51b6f7a0f36a698b5cc833628 openssh-clients-3.6.1p2-33.30.13.s390x.rpm efbaa975735c2e28cc9063997c78f34d openssh-debuginfo-3.6.1p2-33.30.13.s390x.rpm 518f3d002574064fe0401d724df50abd openssh-server-3.6.1p2-33.30.13.s390x.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssh-3.6.1p2-33.30.13.src.rpm b4e08619ea23f2af0429645d98639bd2 openssh-3.6.1p2-33.30.13.src.rpm i386: dcd132e60b59e7a7fd75ac15f55b7207 openssh-3.6.1p2-33.30.13.i386.rpm f1e4ab33051a26303ecf5c8d0fa6d779 openssh-askpass-3.6.1p2-33.30.13.i386.rpm 7fe0c43c9178918e47af5b6cf7a53e50 openssh-askpass-gnome-3.6.1p2-33.30.13.i386.rpm 53cbe1ce4743e7986ec6ca28c61c4941 openssh-clients-3.6.1p2-33.30.13.i386.rpm 7379e0668f24d8e98352326d220bb7b4 openssh-debuginfo-3.6.1p2-33.30.13.i386.rpm e067fb1660d69db52438fd942b18b238 openssh-server-3.6.1p2-33.30.13.i386.rpm ia64: 908a742ccbce2dc3633094328135143d openssh-3.6.1p2-33.30.13.ia64.rpm 3c81416cf2bb3e95a1df43cdb789f1d9 openssh-askpass-3.6.1p2-33.30.13.ia64.rpm ec530b9aae551ad18982fd7c88ea46c5 openssh-askpass-gnome-3.6.1p2-33.30.13.ia64.rpm 21c01f4d6e41be485e0f4f0866c0bcab openssh-clients-3.6.1p2-33.30.13.ia64.rpm c2101a1d81e8dbd6fa5aa66907c55df1 openssh-debuginfo-3.6.1p2-33.30.13.ia64.rpm 52dc05f6756942bb9cd36d652c3e0cb2 openssh-server-3.6.1p2-33.30.13.ia64.rpm x86_64: 881bb14daa2f11d4ccbf6b2479df1074 openssh-3.6.1p2-33.30.13.x86_64.rpm 52a84e68e0900fa418a61f72ddb1c531 openssh-askpass-3.6.1p2-33.30.13.x86_64.rpm a621607fdbaafd4c58aa3627eeee5fe9 openssh-askpass-gnome-3.6.1p2-33.30.13.x86_64.rpm 84688b731d914ad46b35afb375aacd5f openssh-clients-3.6.1p2-33.30.13.x86_64.rpm 8a459f09eaa33da0f400397bc7dedff2 openssh-debuginfo-3.6.1p2-33.30.13.x86_64.rpm 6e95eef8d383b8fe4f21dc64eebbd3cf openssh-server-3.6.1p2-33.30.13.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm ppc: 2af4e90aa5c152ab51bae154ab54d69c openssh-3.9p1-8.RHEL4.17.1.ppc.rpm b6433ae6bb5b320b16b1970aaad929b1 openssh-askpass-3.9p1-8.RHEL4.17.1.ppc.rpm 246880b444305e3e2781ae06f6b0af4b openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ppc.rpm c4cc7545bc8c4e68f9efc14cbee42069 openssh-clients-3.9p1-8.RHEL4.17.1.ppc.rpm f24ca28950dee922c9c58c8610b7c8f4 openssh-debuginfo-3.9p1-8.RHEL4.17.1.ppc.rpm 0232045e1c230a1cb37ba40f44f4ec96 openssh-server-3.9p1-8.RHEL4.17.1.ppc.rpm s390: d3ca921e20d2ed9af35eaba73baa434d openssh-3.9p1-8.RHEL4.17.1.s390.rpm 2bac8f50617955b5be6173b0b386f270 openssh-askpass-3.9p1-8.RHEL4.17.1.s390.rpm f853497e2fb1124055b4d2bede7c56de openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390.rpm fd1d9c9aaa84763fb1ad4d93df7da3df openssh-clients-3.9p1-8.RHEL4.17.1.s390.rpm cf451945401a2dd942bb7a697188df10 openssh-debuginfo-3.9p1-8.RHEL4.17.1.s390.rpm 81c1dfd0f611b7509e2d715e0dc005f0 openssh-server-3.9p1-8.RHEL4.17.1.s390.rpm s390x: 79767ede8be763dab8cf825dfb203374 openssh-3.9p1-8.RHEL4.17.1.s390x.rpm 1e1891b117b67d9ae272fefa96f0b2df openssh-askpass-3.9p1-8.RHEL4.17.1.s390x.rpm 5418dda31a691b7e1d86d367ae3e34cd openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.s390x.rpm f239e3313b6f50a5c75e1ffe86ecfde1 openssh-clients-3.9p1-8.RHEL4.17.1.s390x.rpm 5f2caa775daf4d32e5fafc3fe26ee3f1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.s390x.rpm 4d7d4015d1fa094b782079fcf046f887 openssh-server-3.9p1-8.RHEL4.17.1.s390x.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssh-3.9p1-8.RHEL4.17.1.src.rpm 5270fb8ec13f23828a277857ae68b986 openssh-3.9p1-8.RHEL4.17.1.src.rpm i386: 8b1c7fbd0bf72ceb0b2f5eda16d3fa5d openssh-3.9p1-8.RHEL4.17.1.i386.rpm 79f74f20a37e5e5d9f88bfc80927d201 openssh-askpass-3.9p1-8.RHEL4.17.1.i386.rpm 96db1c1a17e9348677f8d0eaf7d99116 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.i386.rpm f349608f4e1e588f8c544564319f6388 openssh-clients-3.9p1-8.RHEL4.17.1.i386.rpm a4f09849af54d40c51c399e07c7a424d openssh-debuginfo-3.9p1-8.RHEL4.17.1.i386.rpm 2c021513b7f7d86783342293d0a229e0 openssh-server-3.9p1-8.RHEL4.17.1.i386.rpm ia64: 9f7af45fa7b5a5960dae6481797df65f openssh-3.9p1-8.RHEL4.17.1.ia64.rpm 396afde30d013dc3b99473070c9ca016 openssh-askpass-3.9p1-8.RHEL4.17.1.ia64.rpm 05504a84c2ef6cd7eb50e8044d537733 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.ia64.rpm 85931af336574b468781c5348c5be257 openssh-clients-3.9p1-8.RHEL4.17.1.ia64.rpm e6d2d155030f71bc215130d697041cee openssh-debuginfo-3.9p1-8.RHEL4.17.1.ia64.rpm 90098e9f32a04b29e707cc0b3716d438 openssh-server-3.9p1-8.RHEL4.17.1.ia64.rpm x86_64: 0ce295c848385f2a25fa17ae7c0beb52 openssh-3.9p1-8.RHEL4.17.1.x86_64.rpm 826459d7ddfb2b39e718cbb303f246bb openssh-askpass-3.9p1-8.RHEL4.17.1.x86_64.rpm 3d56f032c9ab9d15327173acad692f93 openssh-askpass-gnome-3.9p1-8.RHEL4.17.1.x86_64.rpm 7076713a1e1732e10a66be5dcdea4faa openssh-clients-3.9p1-8.RHEL4.17.1.x86_64.rpm 1419e2d38ce536e89b80621deaa3abc1 openssh-debuginfo-3.9p1-8.RHEL4.17.1.x86_64.rpm 3a7c7aa5c2378ac7c2954ff17acfca19 openssh-server-3.9p1-8.RHEL4.17.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFWylWXlSAg2UNWIIRArrZAJ9gyhNfG6jBy5vKzhoHzfly2QWl1gCcC5GA aJX3No+Hlx2jlvbTWvsJmes= =ZONu -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Nov 15 20:22:21 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 15 Nov 2006 15:22:21 -0500 Subject: [RHSA-2006:0742-01] Critical: elinks security update Message-ID: <200611152022.kAFKMLwq025335@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: elinks security update Advisory ID: RHSA-2006:0742-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0742.html Issue date: 2006-11-15 Updated on: 2006-11-15 Product: Red Hat Enterprise Linux CVE Names: CVE-2006-5925 - --------------------------------------------------------------------- 1. Summary: An updated elinks package that corrects a security vulnerability is now available for Red Hat Enterprise Linux 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Elinks is a text mode Web browser used from the command line that supports rendering modern web pages. An arbitrary file access flaw was found in the Elinks SMB protocol handler. A malicious web page could have caused Elinks to read or write files with the permissions of the user running Elinks. (CVE-2006-5925) All users of Elinks are advised to upgrade to this updated package, which resolves this issue by removing support for the SMB protocol from Elinks. Note: this issue did not affect the Elinks package shipped with Red Hat Enterprise Linux 3, or the Links package shipped with Red Hat Enterprise Linux 2.1. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 215731 - CVE-2006-5925 elinks smb protocol arbitrary file access 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/elinks-0.9.2-3.3.src.rpm 643211bd98a9d92223bedbc69f71d68c elinks-0.9.2-3.3.src.rpm i386: 700134005525634e35dc940cd6d7c843 elinks-0.9.2-3.3.i386.rpm 6f6e5705ae2364733702c9b7b5e8c2ff elinks-debuginfo-0.9.2-3.3.i386.rpm ia64: 15eac414d532897f4da1ecb0063768a7 elinks-0.9.2-3.3.ia64.rpm e9d176e583deb37e34487af2d794ca8f elinks-debuginfo-0.9.2-3.3.ia64.rpm ppc: 39d20a380d0d55d6d9ac40d89e389392 elinks-0.9.2-3.3.ppc.rpm d9980fe0a60b2889ca6dbb00a2a71a3b elinks-debuginfo-0.9.2-3.3.ppc.rpm s390: 3fe1f629f197048d770e327f1b5ca923 elinks-0.9.2-3.3.s390.rpm a4ae0a0dfa968b7dd9ac67a4c511440f elinks-debuginfo-0.9.2-3.3.s390.rpm s390x: 5c5129455dfbd5318477b1fc32421bb6 elinks-0.9.2-3.3.s390x.rpm 14c9a759ed58fc3ea25893aec3bdfae1 elinks-debuginfo-0.9.2-3.3.s390x.rpm x86_64: c9058b064da38141780a52ae4d429709 elinks-0.9.2-3.3.x86_64.rpm 695ae2d149930b299c04dbd822c45e24 elinks-debuginfo-0.9.2-3.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/elinks-0.9.2-3.3.src.rpm 643211bd98a9d92223bedbc69f71d68c elinks-0.9.2-3.3.src.rpm i386: 700134005525634e35dc940cd6d7c843 elinks-0.9.2-3.3.i386.rpm 6f6e5705ae2364733702c9b7b5e8c2ff elinks-debuginfo-0.9.2-3.3.i386.rpm x86_64: c9058b064da38141780a52ae4d429709 elinks-0.9.2-3.3.x86_64.rpm 695ae2d149930b299c04dbd822c45e24 elinks-debuginfo-0.9.2-3.3.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/elinks-0.9.2-3.3.src.rpm 643211bd98a9d92223bedbc69f71d68c elinks-0.9.2-3.3.src.rpm i386: 700134005525634e35dc940cd6d7c843 elinks-0.9.2-3.3.i386.rpm 6f6e5705ae2364733702c9b7b5e8c2ff elinks-debuginfo-0.9.2-3.3.i386.rpm ia64: 15eac414d532897f4da1ecb0063768a7 elinks-0.9.2-3.3.ia64.rpm e9d176e583deb37e34487af2d794ca8f elinks-debuginfo-0.9.2-3.3.ia64.rpm x86_64: c9058b064da38141780a52ae4d429709 elinks-0.9.2-3.3.x86_64.rpm 695ae2d149930b299c04dbd822c45e24 elinks-debuginfo-0.9.2-3.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/elinks-0.9.2-3.3.src.rpm 643211bd98a9d92223bedbc69f71d68c elinks-0.9.2-3.3.src.rpm i386: 700134005525634e35dc940cd6d7c843 elinks-0.9.2-3.3.i386.rpm 6f6e5705ae2364733702c9b7b5e8c2ff elinks-debuginfo-0.9.2-3.3.i386.rpm ia64: 15eac414d532897f4da1ecb0063768a7 elinks-0.9.2-3.3.ia64.rpm e9d176e583deb37e34487af2d794ca8f elinks-debuginfo-0.9.2-3.3.ia64.rpm x86_64: c9058b064da38141780a52ae4d429709 elinks-0.9.2-3.3.x86_64.rpm 695ae2d149930b299c04dbd822c45e24 elinks-debuginfo-0.9.2-3.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5925 http://marc.theaimsgroup.com/?&m=116355556512780 http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFW3b1XlSAg2UNWIIRAoZkAJwMszcO14arlklDMUnKABza7Hc9sgCdFwaT t0KrlF5iGmxRXDAoJk4ot7U= =SnP0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Nov 27 15:49:14 2006 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 27 Nov 2006 10:49:14 -0500 Subject: [RHSA-2006:0743-01] Critical: jbossas security update Message-ID: <200611271549.kARFnELW028988@porkchop.devel.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Critical: jbossas security update Advisory ID: RHSA-2006:0743-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0743.html Issue date: 2006-11-27 Updated on: 2006-11-27 Product: Red Hat Application Stack CVE Names: CVE-2006-5750 - --------------------------------------------------------------------- 1. Summary: An updated jbossas package that corrects a security vulnerability is now available for Red Hat Application Stack. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - noarch Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - noarch 3. Problem description: JBoss Application Server is a J2EE certified platform for developing and deploying enterprise Java applications, Web applications, and Portals. Symantec discovered a flaw in the DeploymentFileRepository class of the JBoss Application Server. A remote attacker who is able to access the console manager could read or write to files with the permissions of the JBoss user. This could potentially lead to arbitrary code execution as the jboss user. (CVE-2006-5750) For the Red Hat Application Stack, the jbossas service is not enabled by default. Once the jbossas service is enabled, the console manager will become accessible on port 8080. Although port 8080 will be blocked from outside access by the default Red Hat Enterprise Linux firewall rules, users should ensure that the console is not available publicly and is adequately protected by authentication as explained in the JBoss documentation. A correct configuration of the JBoss Application Server would mitigate this vulnerability to only being exploitable by users who have authorization to use the console manager. All users of Red Hat Application Stack are advised to upgrade to these updated packages, which resolve the directory traversal issue with a backported patch. These updated packages also contain a change to the default jbossas configuration file. For users installing Red Hat Application Stack for the first time, all JBoss Application Server network services, including the management consoles, will be restricted by default to localhost. No change is made for users upgrading previously installed jbossas packages. Users who already have Red Hat Application Stack installed should check to make sure that they have correctly followed the security guidelines and that the management consoles are not accessible to unauthorized users. Red Hat would like to thank Symantec for reporting this issue. 4. Solution: Before applying this update, make sure that the jbossas service is not running and all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 215828 - CVE-2006-5750 JBoss Java Class DeploymentFileRepository Directory Traversal 216177 - JBossAS needs to be bound to localhost by default 216786 - Config files in the jbossas rpm should be marked accordingly 6. RPMs required: Red Hat Application Stack v1 for Enterprise Linux AS (v.4): SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/RHWAS/SRPMS/jbossas-4.0.4-1.el4s1.25.src.rpm ddcee54695279bfa2bcc1e6dc272edc5 jbossas-4.0.4-1.el4s1.25.src.rpm noarch: edf562a2624881d8198f23bd3e61f443 jbossas-4.0.4-1.el4s1.25.noarch.rpm Red Hat Application Stack v1 for Enterprise Linux ES (v.4): SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/RHWAS/SRPMS/jbossas-4.0.4-1.el4s1.25.src.rpm ddcee54695279bfa2bcc1e6dc272edc5 jbossas-4.0.4-1.el4s1.25.src.rpm noarch: edf562a2624881d8198f23bd3e61f443 jbossas-4.0.4-1.el4s1.25.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5750 http://kbase.redhat.com/faq/FAQ_107_9629.shtm http://www.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFFawj3XlSAg2UNWIIRAu8iAJ48kGq7URffk+k7rgIL/b7FQwZMgQCgmqpK gWZTVStlhcX/y9wPZzOodtQ= =pyX9 -----END PGP SIGNATURE-----