From bugzilla at redhat.com Mon Jan 4 18:29:35 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 4 Jan 2010 13:29:35 -0500 Subject: [RHSA-2010:0002-01] Moderate: PyXML security update Message-ID: <201001041829.o04ITZMK003994@int-mx03.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: PyXML security update Advisory ID: RHSA-2010:0002-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0002.html Issue date: 2010-01-04 CVE Names: CVE-2009-3720 ===================================================================== 1. Summary: An updated PyXML package that fixes one security issue is now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: PyXML provides XML libraries for Python. The distribution contains a validating XML parser, an implementation of the SAX and DOM programming interfaces, and an interface to the Expat parser. A buffer over-read flaw was found in the way PyXML's Expat parser handled malformed UTF-8 sequences when processing XML files. A specially-crafted XML file could cause Python applications using PyXML's Expat parser to crash while parsing the file. (CVE-2009-3720) This update makes PyXML use the system Expat library rather than its own internal copy; therefore, users must install the RHSA-2009:1625 expat update together with this PyXML update to resolve the CVE-2009-3720 issue. All PyXML users should upgrade to this updated package, which changes PyXML to use the system Expat library. After installing this update along with RHSA-2009:1625, applications using the PyXML library must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 531697 - CVE-2009-3720 expat: buffer over-read and crash on XML with malformed UTF-8 sequences 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/PyXML-0.8.3-6.el4_8.2.src.rpm i386: PyXML-0.8.3-6.el4_8.2.i386.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.i386.rpm ia64: PyXML-0.8.3-6.el4_8.2.ia64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.ia64.rpm ppc: PyXML-0.8.3-6.el4_8.2.ppc.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.ppc.rpm s390: PyXML-0.8.3-6.el4_8.2.s390.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.s390.rpm s390x: PyXML-0.8.3-6.el4_8.2.s390x.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.s390x.rpm x86_64: PyXML-0.8.3-6.el4_8.2.x86_64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/PyXML-0.8.3-6.el4_8.2.src.rpm i386: PyXML-0.8.3-6.el4_8.2.i386.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.i386.rpm x86_64: PyXML-0.8.3-6.el4_8.2.x86_64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/PyXML-0.8.3-6.el4_8.2.src.rpm i386: PyXML-0.8.3-6.el4_8.2.i386.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.i386.rpm ia64: PyXML-0.8.3-6.el4_8.2.ia64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.ia64.rpm x86_64: PyXML-0.8.3-6.el4_8.2.x86_64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/PyXML-0.8.3-6.el4_8.2.src.rpm i386: PyXML-0.8.3-6.el4_8.2.i386.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.i386.rpm ia64: PyXML-0.8.3-6.el4_8.2.ia64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.ia64.rpm x86_64: PyXML-0.8.3-6.el4_8.2.x86_64.rpm PyXML-debuginfo-0.8.3-6.el4_8.2.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/PyXML-0.8.4-4.el5_4.2.src.rpm i386: PyXML-0.8.4-4.el5_4.2.i386.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.i386.rpm x86_64: PyXML-0.8.4-4.el5_4.2.x86_64.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/PyXML-0.8.4-4.el5_4.2.src.rpm i386: PyXML-0.8.4-4.el5_4.2.i386.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.i386.rpm ia64: PyXML-0.8.4-4.el5_4.2.ia64.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.ia64.rpm ppc: PyXML-0.8.4-4.el5_4.2.ppc.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.ppc.rpm s390x: PyXML-0.8.4-4.el5_4.2.s390x.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.s390x.rpm x86_64: PyXML-0.8.4-4.el5_4.2.x86_64.rpm PyXML-debuginfo-0.8.4-4.el5_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3720.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLQjNnXlSAg2UNWIIRAsXDAKCJra0JZ2LPP2vHWGiTquZV58jJ+wCgghmh 5vZjM+pHqLtOtlkhgjtFaBw= =Un20 -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Jan 4 18:30:59 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 4 Jan 2010 13:30:59 -0500 Subject: [RHSA-2010:0003-01] Moderate: gd security update Message-ID: <201001041830.o04IUxBx027022@int-mx04.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gd security update Advisory ID: RHSA-2010:0003-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0003.html Issue date: 2010-01-04 CVE Names: CVE-2009-3546 ===================================================================== 1. Summary: Updated gd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The gd packages provide a graphics library used for the dynamic creation of images, such as PNG and JPEG. A missing input sanitization flaw, leading to a buffer overflow, was discovered in the gd library. A specially-crafted GD image file could cause an application using the gd library to crash or, possibly, execute arbitrary code when opened. (CVE-2009-3546) Users of gd should upgrade to these updated packages, which contain a backported patch to resolve this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 529213 - CVE-2009-3546 gd: insufficient input validation in _gdGetColors() 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gd-2.0.28-5.4E.el4_8.1.src.rpm i386: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm ia64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.ia64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.ia64.rpm gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm ppc: gd-2.0.28-5.4E.el4_8.1.ppc.rpm gd-2.0.28-5.4E.el4_8.1.ppc64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.ppc.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.ppc64.rpm gd-devel-2.0.28-5.4E.el4_8.1.ppc.rpm gd-progs-2.0.28-5.4E.el4_8.1.ppc.rpm s390: gd-2.0.28-5.4E.el4_8.1.s390.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.s390.rpm gd-devel-2.0.28-5.4E.el4_8.1.s390.rpm gd-progs-2.0.28-5.4E.el4_8.1.s390.rpm s390x: gd-2.0.28-5.4E.el4_8.1.s390.rpm gd-2.0.28-5.4E.el4_8.1.s390x.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.s390.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.s390x.rpm gd-devel-2.0.28-5.4E.el4_8.1.s390x.rpm gd-progs-2.0.28-5.4E.el4_8.1.s390x.rpm x86_64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gd-2.0.28-5.4E.el4_8.1.src.rpm i386: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm x86_64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gd-2.0.28-5.4E.el4_8.1.src.rpm i386: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm ia64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.ia64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.ia64.rpm gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm x86_64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gd-2.0.28-5.4E.el4_8.1.src.rpm i386: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm ia64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.ia64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.ia64.rpm gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm x86_64: gd-2.0.28-5.4E.el4_8.1.i386.rpm gd-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.i386.rpm gd-debuginfo-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gd-2.0.33-9.4.el5_4.2.src.rpm i386: gd-2.0.33-9.4.el5_4.2.i386.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-progs-2.0.33-9.4.el5_4.2.i386.rpm x86_64: gd-2.0.33-9.4.el5_4.2.i386.rpm gd-2.0.33-9.4.el5_4.2.x86_64.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.x86_64.rpm gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gd-2.0.33-9.4.el5_4.2.src.rpm i386: gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-devel-2.0.33-9.4.el5_4.2.i386.rpm x86_64: gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.x86_64.rpm gd-devel-2.0.33-9.4.el5_4.2.i386.rpm gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gd-2.0.33-9.4.el5_4.2.src.rpm i386: gd-2.0.33-9.4.el5_4.2.i386.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-devel-2.0.33-9.4.el5_4.2.i386.rpm gd-progs-2.0.33-9.4.el5_4.2.i386.rpm ia64: gd-2.0.33-9.4.el5_4.2.ia64.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.ia64.rpm gd-devel-2.0.33-9.4.el5_4.2.ia64.rpm gd-progs-2.0.33-9.4.el5_4.2.ia64.rpm ppc: gd-2.0.33-9.4.el5_4.2.ppc.rpm gd-2.0.33-9.4.el5_4.2.ppc64.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.ppc.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.ppc64.rpm gd-devel-2.0.33-9.4.el5_4.2.ppc.rpm gd-devel-2.0.33-9.4.el5_4.2.ppc64.rpm gd-progs-2.0.33-9.4.el5_4.2.ppc.rpm s390x: gd-2.0.33-9.4.el5_4.2.s390.rpm gd-2.0.33-9.4.el5_4.2.s390x.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.s390.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.s390x.rpm gd-devel-2.0.33-9.4.el5_4.2.s390.rpm gd-devel-2.0.33-9.4.el5_4.2.s390x.rpm gd-progs-2.0.33-9.4.el5_4.2.s390x.rpm x86_64: gd-2.0.33-9.4.el5_4.2.i386.rpm gd-2.0.33-9.4.el5_4.2.x86_64.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.i386.rpm gd-debuginfo-2.0.33-9.4.el5_4.2.x86_64.rpm gd-devel-2.0.33-9.4.el5_4.2.i386.rpm gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3546.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLQjOVXlSAg2UNWIIRAmxgAKCv/qplg/WUwM4U0Yp6QBOw9DLqywCePezv mY9Ccbe8zJ11pC1yekIOHgk= =QPQo -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 7 19:16:36 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Jan 2010 14:16:36 -0500 Subject: [RHSA-2010:0018-01] Moderate: dbus security update Message-ID: <201001071916.o07JGa3v000714@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: dbus security update Advisory ID: RHSA-2010:0018-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0018.html Issue date: 2010-01-07 CVE Names: CVE-2009-1189 ===================================================================== 1. Summary: Updated dbus packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: D-Bus is a system for sending messages between applications. It is used for the system-wide message bus service and as a per-user-login-session messaging facility. It was discovered that the Red Hat Security Advisory RHSA-2009:0008 did not correctly fix the denial of service flaw in the system for sending messages between applications. A local user could use this flaw to send a message with a malformed signature to the bus, causing the bus (and, consequently, any process using libdbus to receive messages) to abort. (CVE-2009-1189) Note: Users running any application providing services over the system message bus are advised to test this update carefully before deploying it in production environments. All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. For the update to take effect, all running instances of dbus-daemon and all running applications using the libdbus library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 496672 - CVE-2009-1189 dbus: invalid fix for CVE-2008-3834 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dbus-1.1.2-12.el5_4.1.src.rpm i386: dbus-1.1.2-12.el5_4.1.i386.rpm dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-libs-1.1.2-12.el5_4.1.i386.rpm dbus-x11-1.1.2-12.el5_4.1.i386.rpm x86_64: dbus-1.1.2-12.el5_4.1.i386.rpm dbus-1.1.2-12.el5_4.1.x86_64.rpm dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-debuginfo-1.1.2-12.el5_4.1.x86_64.rpm dbus-libs-1.1.2-12.el5_4.1.i386.rpm dbus-libs-1.1.2-12.el5_4.1.x86_64.rpm dbus-x11-1.1.2-12.el5_4.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/dbus-1.1.2-12.el5_4.1.src.rpm i386: dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-devel-1.1.2-12.el5_4.1.i386.rpm x86_64: dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-debuginfo-1.1.2-12.el5_4.1.x86_64.rpm dbus-devel-1.1.2-12.el5_4.1.i386.rpm dbus-devel-1.1.2-12.el5_4.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/dbus-1.1.2-12.el5_4.1.src.rpm i386: dbus-1.1.2-12.el5_4.1.i386.rpm dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-devel-1.1.2-12.el5_4.1.i386.rpm dbus-libs-1.1.2-12.el5_4.1.i386.rpm dbus-x11-1.1.2-12.el5_4.1.i386.rpm ia64: dbus-1.1.2-12.el5_4.1.ia64.rpm dbus-debuginfo-1.1.2-12.el5_4.1.ia64.rpm dbus-devel-1.1.2-12.el5_4.1.ia64.rpm dbus-libs-1.1.2-12.el5_4.1.ia64.rpm dbus-x11-1.1.2-12.el5_4.1.ia64.rpm ppc: dbus-1.1.2-12.el5_4.1.ppc.rpm dbus-1.1.2-12.el5_4.1.ppc64.rpm dbus-debuginfo-1.1.2-12.el5_4.1.ppc.rpm dbus-debuginfo-1.1.2-12.el5_4.1.ppc64.rpm dbus-devel-1.1.2-12.el5_4.1.ppc.rpm dbus-devel-1.1.2-12.el5_4.1.ppc64.rpm dbus-libs-1.1.2-12.el5_4.1.ppc.rpm dbus-libs-1.1.2-12.el5_4.1.ppc64.rpm dbus-x11-1.1.2-12.el5_4.1.ppc.rpm s390x: dbus-1.1.2-12.el5_4.1.s390.rpm dbus-1.1.2-12.el5_4.1.s390x.rpm dbus-debuginfo-1.1.2-12.el5_4.1.s390.rpm dbus-debuginfo-1.1.2-12.el5_4.1.s390x.rpm dbus-devel-1.1.2-12.el5_4.1.s390.rpm dbus-devel-1.1.2-12.el5_4.1.s390x.rpm dbus-libs-1.1.2-12.el5_4.1.s390.rpm dbus-libs-1.1.2-12.el5_4.1.s390x.rpm dbus-x11-1.1.2-12.el5_4.1.s390x.rpm x86_64: dbus-1.1.2-12.el5_4.1.i386.rpm dbus-1.1.2-12.el5_4.1.x86_64.rpm dbus-debuginfo-1.1.2-12.el5_4.1.i386.rpm dbus-debuginfo-1.1.2-12.el5_4.1.x86_64.rpm dbus-devel-1.1.2-12.el5_4.1.i386.rpm dbus-devel-1.1.2-12.el5_4.1.x86_64.rpm dbus-libs-1.1.2-12.el5_4.1.i386.rpm dbus-libs-1.1.2-12.el5_4.1.x86_64.rpm dbus-x11-1.1.2-12.el5_4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-1189.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLRjL4XlSAg2UNWIIRAkzJAKCfk9Fo5RoJyt1xszKXq+q/9PYjLwCgwqHo isEZM34aLMK9LXqZxKFFR00= =l9Mn -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Jan 8 00:47:00 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Jan 2010 19:47:00 -0500 Subject: [RHSA-2010:0019-01] Important: kernel security update Message-ID: <201001080047.o080l0iN030397@int-mx08.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2010:0019-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0019.html Issue date: 2010-01-07 CVE Names: CVE-2007-4567 CVE-2009-4536 CVE-2009-4537 CVE-2009-4538 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * a flaw was found in the IPv6 Extension Header (EH) handling implementation in the Linux kernel. The skb->dst data structure was not properly validated in the ipv6_hop_jumbo() function. This could possibly lead to a remote denial of service. (CVE-2007-4567, Important) * a flaw was found in each of the following Intel PRO/1000 Linux drivers in the Linux kernel: e1000 and e1000e. A remote attacker using packets larger than the MTU could bypass the existing fragment check, resulting in partial, invalid frames being passed to the network stack. These flaws could also possibly be used to trigger a remote denial of service. (CVE-2009-4536, CVE-2009-4538, Important) * a flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel. Receiving overly-long frames with network cards supported by this driver could possibly result in a remote denial of service. (CVE-2009-4537, Important) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 548641 - CVE-2007-4567 kernel: ipv6_hop_jumbo remote system crash 550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3 551214 - CVE-2009-4538 kernel: e1000e frame fragment issue 552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-164.10.1.el5.src.rpm i386: kernel-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-devel-2.6.18-164.10.1.el5.i686.rpm kernel-debug-2.6.18-164.10.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-debug-devel-2.6.18-164.10.1.el5.i686.rpm kernel-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.i686.rpm kernel-devel-2.6.18-164.10.1.el5.i686.rpm kernel-headers-2.6.18-164.10.1.el5.i386.rpm kernel-xen-2.6.18-164.10.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-xen-devel-2.6.18-164.10.1.el5.i686.rpm noarch: kernel-doc-2.6.18-164.10.1.el5.noarch.rpm x86_64: kernel-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-164.10.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.x86_64.rpm kernel-devel-2.6.18-164.10.1.el5.x86_64.rpm kernel-headers-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-164.10.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-164.10.1.el5.src.rpm i386: kernel-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-PAE-devel-2.6.18-164.10.1.el5.i686.rpm kernel-debug-2.6.18-164.10.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-debug-devel-2.6.18-164.10.1.el5.i686.rpm kernel-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.i686.rpm kernel-devel-2.6.18-164.10.1.el5.i686.rpm kernel-headers-2.6.18-164.10.1.el5.i386.rpm kernel-xen-2.6.18-164.10.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-164.10.1.el5.i686.rpm kernel-xen-devel-2.6.18-164.10.1.el5.i686.rpm ia64: kernel-2.6.18-164.10.1.el5.ia64.rpm kernel-debug-2.6.18-164.10.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.ia64.rpm kernel-debug-devel-2.6.18-164.10.1.el5.ia64.rpm kernel-debuginfo-2.6.18-164.10.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.ia64.rpm kernel-devel-2.6.18-164.10.1.el5.ia64.rpm kernel-headers-2.6.18-164.10.1.el5.ia64.rpm kernel-xen-2.6.18-164.10.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-164.10.1.el5.ia64.rpm kernel-xen-devel-2.6.18-164.10.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-164.10.1.el5.noarch.rpm ppc: kernel-2.6.18-164.10.1.el5.ppc64.rpm kernel-debug-2.6.18-164.10.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-164.10.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-164.10.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.ppc64.rpm kernel-devel-2.6.18-164.10.1.el5.ppc64.rpm kernel-headers-2.6.18-164.10.1.el5.ppc.rpm kernel-headers-2.6.18-164.10.1.el5.ppc64.rpm kernel-kdump-2.6.18-164.10.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-164.10.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-164.10.1.el5.ppc64.rpm s390x: kernel-2.6.18-164.10.1.el5.s390x.rpm kernel-debug-2.6.18-164.10.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.s390x.rpm kernel-debug-devel-2.6.18-164.10.1.el5.s390x.rpm kernel-debuginfo-2.6.18-164.10.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.s390x.rpm kernel-devel-2.6.18-164.10.1.el5.s390x.rpm kernel-headers-2.6.18-164.10.1.el5.s390x.rpm kernel-kdump-2.6.18-164.10.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-164.10.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-164.10.1.el5.s390x.rpm x86_64: kernel-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-164.10.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-164.10.1.el5.x86_64.rpm kernel-devel-2.6.18-164.10.1.el5.x86_64.rpm kernel-headers-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-164.10.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-164.10.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2007-4567.html https://www.redhat.com/security/data/cve/CVE-2009-4536.html https://www.redhat.com/security/data/cve/CVE-2009-4537.html https://www.redhat.com/security/data/cve/CVE-2009-4538.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLRoBoXlSAg2UNWIIRAqugAKCDjq+kI4XxC8qMr79ck0oW98cQOgCeI27J CrYPDUVWrzg5gcZVTP2ZUak= =QBd3 -----END PGP SIGNATURE----- From bugzilla at redhat.com Fri Jan 8 00:47:26 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 7 Jan 2010 19:47:26 -0500 Subject: [RHSA-2010:0020-01] Important: kernel security update Message-ID: <201001080047.o080lQqx007553@int-mx03.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2010:0020-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0020.html Issue date: 2010-01-07 CVE Names: CVE-2009-4536 CVE-2009-4537 CVE-2009-4538 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * a flaw was found in each of the following Intel PRO/1000 Linux drivers in the Linux kernel: e1000 and e1000e. A remote attacker using packets larger than the MTU could bypass the existing fragment check, resulting in partial, invalid frames being passed to the network stack. These flaws could also possibly be used to trigger a remote denial of service. (CVE-2009-4536, CVE-2009-4538, Important) * a flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel. Receiving overly-long frames with network cards supported by this driver could possibly result in a remote denial of service. (CVE-2009-4537, Important) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3 551214 - CVE-2009-4538 kernel: e1000e frame fragment issue 552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-89.0.19.EL.src.rpm i386: kernel-2.6.9-89.0.19.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.19.EL.i686.rpm kernel-devel-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.19.EL.i686.rpm kernel-smp-2.6.9-89.0.19.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.i686.rpm ia64: kernel-2.6.9-89.0.19.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.ia64.rpm kernel-devel-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.19.EL.noarch.rpm ppc: kernel-2.6.9-89.0.19.EL.ppc64.rpm kernel-2.6.9-89.0.19.EL.ppc64iseries.rpm kernel-debuginfo-2.6.9-89.0.19.EL.ppc64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.ppc64iseries.rpm kernel-devel-2.6.9-89.0.19.EL.ppc64.rpm kernel-devel-2.6.9-89.0.19.EL.ppc64iseries.rpm kernel-largesmp-2.6.9-89.0.19.EL.ppc64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.ppc64.rpm s390: kernel-2.6.9-89.0.19.EL.s390.rpm kernel-debuginfo-2.6.9-89.0.19.EL.s390.rpm kernel-devel-2.6.9-89.0.19.EL.s390.rpm s390x: kernel-2.6.9-89.0.19.EL.s390x.rpm kernel-debuginfo-2.6.9-89.0.19.EL.s390x.rpm kernel-devel-2.6.9-89.0.19.EL.s390x.rpm x86_64: kernel-2.6.9-89.0.19.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.x86_64.rpm kernel-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-89.0.19.EL.src.rpm i386: kernel-2.6.9-89.0.19.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.19.EL.i686.rpm kernel-devel-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.19.EL.i686.rpm kernel-smp-2.6.9-89.0.19.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.i686.rpm noarch: kernel-doc-2.6.9-89.0.19.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.19.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.x86_64.rpm kernel-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-89.0.19.EL.src.rpm i386: kernel-2.6.9-89.0.19.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.19.EL.i686.rpm kernel-devel-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.19.EL.i686.rpm kernel-smp-2.6.9-89.0.19.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.i686.rpm ia64: kernel-2.6.9-89.0.19.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.ia64.rpm kernel-devel-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.19.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.19.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.x86_64.rpm kernel-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-89.0.19.EL.src.rpm i386: kernel-2.6.9-89.0.19.EL.i686.rpm kernel-debuginfo-2.6.9-89.0.19.EL.i686.rpm kernel-devel-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-2.6.9-89.0.19.EL.i686.rpm kernel-hugemem-devel-2.6.9-89.0.19.EL.i686.rpm kernel-smp-2.6.9-89.0.19.EL.i686.rpm kernel-smp-devel-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-2.6.9-89.0.19.EL.i686.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.i686.rpm ia64: kernel-2.6.9-89.0.19.EL.ia64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.ia64.rpm kernel-devel-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-2.6.9-89.0.19.EL.ia64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.ia64.rpm noarch: kernel-doc-2.6.9-89.0.19.EL.noarch.rpm x86_64: kernel-2.6.9-89.0.19.EL.x86_64.rpm kernel-debuginfo-2.6.9-89.0.19.EL.x86_64.rpm kernel-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-2.6.9-89.0.19.EL.x86_64.rpm kernel-largesmp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-2.6.9-89.0.19.EL.x86_64.rpm kernel-smp-devel-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-2.6.9-89.0.19.EL.x86_64.rpm kernel-xenU-devel-2.6.9-89.0.19.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4536.html https://www.redhat.com/security/data/cve/CVE-2009-4537.html https://www.redhat.com/security/data/cve/CVE-2009-4538.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLRoCKXlSAg2UNWIIRAhvGAJ9wrANx8ZDH7Nhwaf0c9XXy5LE+ZACePrLS 7c15bp3NUIV7bQWoYqy9UzY= =h06e -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 12 22:36:07 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 12 Jan 2010 17:36:07 -0500 Subject: [RHSA-2010:0029-01] Critical: krb5 security update Message-ID: <201001122236.o0CMa709005329@int-mx08.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: krb5 security update Advisory ID: RHSA-2010:0029-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0029.html Issue date: 2010-01-12 CVE Names: CVE-2009-4212 ===================================================================== 1. Summary: Updated krb5 packages that fix multiple security issues are now available for Red Hat Enterprise Linux 3, 4, and 5, and Red Hat Enterprise Linux 4.7, 5.2, and 5.3 Extended Update Support. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux (v. 5.2.z server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux (v. 5.3.z server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4.7.z - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4.7.z - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Kerberos is a network authentication system which allows clients and servers to authenticate to each other using symmetric encryption and a trusted third party, the Key Distribution Center (KDC). Multiple integer underflow flaws, leading to heap-based corruption, were found in the way the MIT Kerberos Key Distribution Center (KDC) decrypted ciphertexts encrypted with the Advanced Encryption Standard (AES) and ARCFOUR (RC4) encryption algorithms. If a remote KDC client were able to provide a specially-crafted AES- or RC4-encrypted ciphertext or texts, it could potentially lead to either a denial of service of the central KDC (KDC crash or abort upon processing the crafted ciphertext), or arbitrary code execution with the privileges of the KDC (i.e., root privileges). (CVE-2009-4212) All krb5 users should upgrade to these updated packages, which contain a backported patch to correct these issues. All running services using the MIT Kerberos libraries must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 545015 - CVE-2009-4212 krb: KDC integer overflows in AES and RC4 decryption routines (MITKRB5-SA-2009-004) 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/krb5-1.2.7-71.src.rpm i386: krb5-debuginfo-1.2.7-71.i386.rpm krb5-devel-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.i386.rpm krb5-server-1.2.7-71.i386.rpm krb5-workstation-1.2.7-71.i386.rpm ia64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.ia64.rpm krb5-devel-1.2.7-71.ia64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.ia64.rpm krb5-server-1.2.7-71.ia64.rpm krb5-workstation-1.2.7-71.ia64.rpm ppc: krb5-debuginfo-1.2.7-71.ppc.rpm krb5-debuginfo-1.2.7-71.ppc64.rpm krb5-devel-1.2.7-71.ppc.rpm krb5-libs-1.2.7-71.ppc.rpm krb5-libs-1.2.7-71.ppc64.rpm krb5-server-1.2.7-71.ppc.rpm krb5-workstation-1.2.7-71.ppc.rpm s390: krb5-debuginfo-1.2.7-71.s390.rpm krb5-devel-1.2.7-71.s390.rpm krb5-libs-1.2.7-71.s390.rpm krb5-server-1.2.7-71.s390.rpm krb5-workstation-1.2.7-71.s390.rpm s390x: krb5-debuginfo-1.2.7-71.s390.rpm krb5-debuginfo-1.2.7-71.s390x.rpm krb5-devel-1.2.7-71.s390x.rpm krb5-libs-1.2.7-71.s390.rpm krb5-libs-1.2.7-71.s390x.rpm krb5-server-1.2.7-71.s390x.rpm krb5-workstation-1.2.7-71.s390x.rpm x86_64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.x86_64.rpm krb5-devel-1.2.7-71.x86_64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.x86_64.rpm krb5-server-1.2.7-71.x86_64.rpm krb5-workstation-1.2.7-71.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/krb5-1.2.7-71.src.rpm i386: krb5-debuginfo-1.2.7-71.i386.rpm krb5-devel-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.i386.rpm krb5-server-1.2.7-71.i386.rpm krb5-workstation-1.2.7-71.i386.rpm x86_64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.x86_64.rpm krb5-devel-1.2.7-71.x86_64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.x86_64.rpm krb5-server-1.2.7-71.x86_64.rpm krb5-workstation-1.2.7-71.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/krb5-1.2.7-71.src.rpm i386: krb5-debuginfo-1.2.7-71.i386.rpm krb5-devel-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.i386.rpm krb5-server-1.2.7-71.i386.rpm krb5-workstation-1.2.7-71.i386.rpm ia64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.ia64.rpm krb5-devel-1.2.7-71.ia64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.ia64.rpm krb5-server-1.2.7-71.ia64.rpm krb5-workstation-1.2.7-71.ia64.rpm x86_64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.x86_64.rpm krb5-devel-1.2.7-71.x86_64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.x86_64.rpm krb5-server-1.2.7-71.x86_64.rpm krb5-workstation-1.2.7-71.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/krb5-1.2.7-71.src.rpm i386: krb5-debuginfo-1.2.7-71.i386.rpm krb5-devel-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.i386.rpm krb5-server-1.2.7-71.i386.rpm krb5-workstation-1.2.7-71.i386.rpm ia64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.ia64.rpm krb5-devel-1.2.7-71.ia64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.ia64.rpm krb5-server-1.2.7-71.ia64.rpm krb5-workstation-1.2.7-71.ia64.rpm x86_64: krb5-debuginfo-1.2.7-71.i386.rpm krb5-debuginfo-1.2.7-71.x86_64.rpm krb5-devel-1.2.7-71.x86_64.rpm krb5-libs-1.2.7-71.i386.rpm krb5-libs-1.2.7-71.x86_64.rpm krb5-server-1.2.7-71.x86_64.rpm krb5-workstation-1.2.7-71.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/krb5-1.3.4-62.el4_8.1.src.rpm i386: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-devel-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-server-1.3.4-62.el4_8.1.i386.rpm krb5-workstation-1.3.4-62.el4_8.1.i386.rpm ia64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.ia64.rpm krb5-devel-1.3.4-62.el4_8.1.ia64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.ia64.rpm krb5-server-1.3.4-62.el4_8.1.ia64.rpm krb5-workstation-1.3.4-62.el4_8.1.ia64.rpm ppc: krb5-debuginfo-1.3.4-62.el4_8.1.ppc.rpm krb5-debuginfo-1.3.4-62.el4_8.1.ppc64.rpm krb5-devel-1.3.4-62.el4_8.1.ppc.rpm krb5-libs-1.3.4-62.el4_8.1.ppc.rpm krb5-libs-1.3.4-62.el4_8.1.ppc64.rpm krb5-server-1.3.4-62.el4_8.1.ppc.rpm krb5-workstation-1.3.4-62.el4_8.1.ppc.rpm s390: krb5-debuginfo-1.3.4-62.el4_8.1.s390.rpm krb5-devel-1.3.4-62.el4_8.1.s390.rpm krb5-libs-1.3.4-62.el4_8.1.s390.rpm krb5-server-1.3.4-62.el4_8.1.s390.rpm krb5-workstation-1.3.4-62.el4_8.1.s390.rpm s390x: krb5-debuginfo-1.3.4-62.el4_8.1.s390.rpm krb5-debuginfo-1.3.4-62.el4_8.1.s390x.rpm krb5-devel-1.3.4-62.el4_8.1.s390x.rpm krb5-libs-1.3.4-62.el4_8.1.s390.rpm krb5-libs-1.3.4-62.el4_8.1.s390x.rpm krb5-server-1.3.4-62.el4_8.1.s390x.rpm krb5-workstation-1.3.4-62.el4_8.1.s390x.rpm x86_64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.x86_64.rpm krb5-devel-1.3.4-62.el4_8.1.x86_64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.x86_64.rpm krb5-server-1.3.4-62.el4_8.1.x86_64.rpm krb5-workstation-1.3.4-62.el4_8.1.x86_64.rpm Red Hat Enterprise Linux AS version 4.7.z: Source: krb5-1.3.4-60.el4_7.3.src.rpm i386: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-devel-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-server-1.3.4-60.el4_7.3.i386.rpm krb5-workstation-1.3.4-60.el4_7.3.i386.rpm ia64: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-debuginfo-1.3.4-60.el4_7.3.ia64.rpm krb5-devel-1.3.4-60.el4_7.3.ia64.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.ia64.rpm krb5-server-1.3.4-60.el4_7.3.ia64.rpm krb5-workstation-1.3.4-60.el4_7.3.ia64.rpm ppc: krb5-debuginfo-1.3.4-60.el4_7.3.ppc.rpm krb5-debuginfo-1.3.4-60.el4_7.3.ppc64.rpm krb5-devel-1.3.4-60.el4_7.3.ppc.rpm krb5-libs-1.3.4-60.el4_7.3.ppc.rpm krb5-libs-1.3.4-60.el4_7.3.ppc64.rpm krb5-server-1.3.4-60.el4_7.3.ppc.rpm krb5-workstation-1.3.4-60.el4_7.3.ppc.rpm s390: krb5-debuginfo-1.3.4-60.el4_7.3.s390.rpm krb5-devel-1.3.4-60.el4_7.3.s390.rpm krb5-libs-1.3.4-60.el4_7.3.s390.rpm krb5-server-1.3.4-60.el4_7.3.s390.rpm krb5-workstation-1.3.4-60.el4_7.3.s390.rpm s390x: krb5-debuginfo-1.3.4-60.el4_7.3.s390.rpm krb5-debuginfo-1.3.4-60.el4_7.3.s390x.rpm krb5-devel-1.3.4-60.el4_7.3.s390x.rpm krb5-libs-1.3.4-60.el4_7.3.s390.rpm krb5-libs-1.3.4-60.el4_7.3.s390x.rpm krb5-server-1.3.4-60.el4_7.3.s390x.rpm krb5-workstation-1.3.4-60.el4_7.3.s390x.rpm x86_64: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-debuginfo-1.3.4-60.el4_7.3.x86_64.rpm krb5-devel-1.3.4-60.el4_7.3.x86_64.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.x86_64.rpm krb5-server-1.3.4-60.el4_7.3.x86_64.rpm krb5-workstation-1.3.4-60.el4_7.3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/krb5-1.3.4-62.el4_8.1.src.rpm i386: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-devel-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-server-1.3.4-62.el4_8.1.i386.rpm krb5-workstation-1.3.4-62.el4_8.1.i386.rpm x86_64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.x86_64.rpm krb5-devel-1.3.4-62.el4_8.1.x86_64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.x86_64.rpm krb5-server-1.3.4-62.el4_8.1.x86_64.rpm krb5-workstation-1.3.4-62.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/krb5-1.3.4-62.el4_8.1.src.rpm i386: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-devel-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-server-1.3.4-62.el4_8.1.i386.rpm krb5-workstation-1.3.4-62.el4_8.1.i386.rpm ia64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.ia64.rpm krb5-devel-1.3.4-62.el4_8.1.ia64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.ia64.rpm krb5-server-1.3.4-62.el4_8.1.ia64.rpm krb5-workstation-1.3.4-62.el4_8.1.ia64.rpm x86_64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.x86_64.rpm krb5-devel-1.3.4-62.el4_8.1.x86_64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.x86_64.rpm krb5-server-1.3.4-62.el4_8.1.x86_64.rpm krb5-workstation-1.3.4-62.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4.7.z: Source: krb5-1.3.4-60.el4_7.3.src.rpm i386: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-devel-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-server-1.3.4-60.el4_7.3.i386.rpm krb5-workstation-1.3.4-60.el4_7.3.i386.rpm ia64: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-debuginfo-1.3.4-60.el4_7.3.ia64.rpm krb5-devel-1.3.4-60.el4_7.3.ia64.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.ia64.rpm krb5-server-1.3.4-60.el4_7.3.ia64.rpm krb5-workstation-1.3.4-60.el4_7.3.ia64.rpm x86_64: krb5-debuginfo-1.3.4-60.el4_7.3.i386.rpm krb5-debuginfo-1.3.4-60.el4_7.3.x86_64.rpm krb5-devel-1.3.4-60.el4_7.3.x86_64.rpm krb5-libs-1.3.4-60.el4_7.3.i386.rpm krb5-libs-1.3.4-60.el4_7.3.x86_64.rpm krb5-server-1.3.4-60.el4_7.3.x86_64.rpm krb5-workstation-1.3.4-60.el4_7.3.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/krb5-1.3.4-62.el4_8.1.src.rpm i386: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-devel-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-server-1.3.4-62.el4_8.1.i386.rpm krb5-workstation-1.3.4-62.el4_8.1.i386.rpm ia64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.ia64.rpm krb5-devel-1.3.4-62.el4_8.1.ia64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.ia64.rpm krb5-server-1.3.4-62.el4_8.1.ia64.rpm krb5-workstation-1.3.4-62.el4_8.1.ia64.rpm x86_64: krb5-debuginfo-1.3.4-62.el4_8.1.i386.rpm krb5-debuginfo-1.3.4-62.el4_8.1.x86_64.rpm krb5-devel-1.3.4-62.el4_8.1.x86_64.rpm krb5-libs-1.3.4-62.el4_8.1.i386.rpm krb5-libs-1.3.4-62.el4_8.1.x86_64.rpm krb5-server-1.3.4-62.el4_8.1.x86_64.rpm krb5-workstation-1.3.4-62.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.6.1-36.el5_4.1.src.rpm i386: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-libs-1.6.1-36.el5_4.1.i386.rpm krb5-workstation-1.6.1-36.el5_4.1.i386.rpm x86_64: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-debuginfo-1.6.1-36.el5_4.1.x86_64.rpm krb5-libs-1.6.1-36.el5_4.1.i386.rpm krb5-libs-1.6.1-36.el5_4.1.x86_64.rpm krb5-workstation-1.6.1-36.el5_4.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/krb5-1.6.1-36.el5_4.1.src.rpm i386: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-devel-1.6.1-36.el5_4.1.i386.rpm krb5-server-1.6.1-36.el5_4.1.i386.rpm x86_64: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-debuginfo-1.6.1-36.el5_4.1.x86_64.rpm krb5-devel-1.6.1-36.el5_4.1.i386.rpm krb5-devel-1.6.1-36.el5_4.1.x86_64.rpm krb5-server-1.6.1-36.el5_4.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/krb5-1.6.1-36.el5_4.1.src.rpm i386: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-devel-1.6.1-36.el5_4.1.i386.rpm krb5-libs-1.6.1-36.el5_4.1.i386.rpm krb5-server-1.6.1-36.el5_4.1.i386.rpm krb5-workstation-1.6.1-36.el5_4.1.i386.rpm ia64: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-debuginfo-1.6.1-36.el5_4.1.ia64.rpm krb5-devel-1.6.1-36.el5_4.1.ia64.rpm krb5-libs-1.6.1-36.el5_4.1.i386.rpm krb5-libs-1.6.1-36.el5_4.1.ia64.rpm krb5-server-1.6.1-36.el5_4.1.ia64.rpm krb5-workstation-1.6.1-36.el5_4.1.ia64.rpm ppc: krb5-debuginfo-1.6.1-36.el5_4.1.ppc.rpm krb5-debuginfo-1.6.1-36.el5_4.1.ppc64.rpm krb5-devel-1.6.1-36.el5_4.1.ppc.rpm krb5-devel-1.6.1-36.el5_4.1.ppc64.rpm krb5-libs-1.6.1-36.el5_4.1.ppc.rpm krb5-libs-1.6.1-36.el5_4.1.ppc64.rpm krb5-server-1.6.1-36.el5_4.1.ppc.rpm krb5-workstation-1.6.1-36.el5_4.1.ppc.rpm s390x: krb5-debuginfo-1.6.1-36.el5_4.1.s390.rpm krb5-debuginfo-1.6.1-36.el5_4.1.s390x.rpm krb5-devel-1.6.1-36.el5_4.1.s390.rpm krb5-devel-1.6.1-36.el5_4.1.s390x.rpm krb5-libs-1.6.1-36.el5_4.1.s390.rpm krb5-libs-1.6.1-36.el5_4.1.s390x.rpm krb5-server-1.6.1-36.el5_4.1.s390x.rpm krb5-workstation-1.6.1-36.el5_4.1.s390x.rpm x86_64: krb5-debuginfo-1.6.1-36.el5_4.1.i386.rpm krb5-debuginfo-1.6.1-36.el5_4.1.x86_64.rpm krb5-devel-1.6.1-36.el5_4.1.i386.rpm krb5-devel-1.6.1-36.el5_4.1.x86_64.rpm krb5-libs-1.6.1-36.el5_4.1.i386.rpm krb5-libs-1.6.1-36.el5_4.1.x86_64.rpm krb5-server-1.6.1-36.el5_4.1.x86_64.rpm krb5-workstation-1.6.1-36.el5_4.1.x86_64.rpm Red Hat Enterprise Linux (v. 5.2.z server): Source: krb5-1.6.1-25.el5_2.3.src.rpm i386: krb5-debuginfo-1.6.1-25.el5_2.3.i386.rpm krb5-devel-1.6.1-25.el5_2.3.i386.rpm krb5-libs-1.6.1-25.el5_2.3.i386.rpm krb5-server-1.6.1-25.el5_2.3.i386.rpm krb5-workstation-1.6.1-25.el5_2.3.i386.rpm ia64: krb5-debuginfo-1.6.1-25.el5_2.3.i386.rpm krb5-debuginfo-1.6.1-25.el5_2.3.ia64.rpm krb5-devel-1.6.1-25.el5_2.3.ia64.rpm krb5-libs-1.6.1-25.el5_2.3.i386.rpm krb5-libs-1.6.1-25.el5_2.3.ia64.rpm krb5-server-1.6.1-25.el5_2.3.ia64.rpm krb5-workstation-1.6.1-25.el5_2.3.ia64.rpm ppc: krb5-debuginfo-1.6.1-25.el5_2.3.ppc.rpm krb5-debuginfo-1.6.1-25.el5_2.3.ppc64.rpm krb5-devel-1.6.1-25.el5_2.3.ppc.rpm krb5-devel-1.6.1-25.el5_2.3.ppc64.rpm krb5-libs-1.6.1-25.el5_2.3.ppc.rpm krb5-libs-1.6.1-25.el5_2.3.ppc64.rpm krb5-server-1.6.1-25.el5_2.3.ppc.rpm krb5-workstation-1.6.1-25.el5_2.3.ppc.rpm s390x: krb5-debuginfo-1.6.1-25.el5_2.3.s390.rpm krb5-debuginfo-1.6.1-25.el5_2.3.s390x.rpm krb5-devel-1.6.1-25.el5_2.3.s390.rpm krb5-devel-1.6.1-25.el5_2.3.s390x.rpm krb5-libs-1.6.1-25.el5_2.3.s390.rpm krb5-libs-1.6.1-25.el5_2.3.s390x.rpm krb5-server-1.6.1-25.el5_2.3.s390x.rpm krb5-workstation-1.6.1-25.el5_2.3.s390x.rpm x86_64: krb5-debuginfo-1.6.1-25.el5_2.3.i386.rpm krb5-debuginfo-1.6.1-25.el5_2.3.x86_64.rpm krb5-devel-1.6.1-25.el5_2.3.i386.rpm krb5-devel-1.6.1-25.el5_2.3.x86_64.rpm krb5-libs-1.6.1-25.el5_2.3.i386.rpm krb5-libs-1.6.1-25.el5_2.3.x86_64.rpm krb5-server-1.6.1-25.el5_2.3.x86_64.rpm krb5-workstation-1.6.1-25.el5_2.3.x86_64.rpm Red Hat Enterprise Linux (v. 5.3.z server): Source: krb5-1.6.1-31.el5_3.4.src.rpm i386: krb5-debuginfo-1.6.1-31.el5_3.4.i386.rpm krb5-devel-1.6.1-31.el5_3.4.i386.rpm krb5-libs-1.6.1-31.el5_3.4.i386.rpm krb5-server-1.6.1-31.el5_3.4.i386.rpm krb5-workstation-1.6.1-31.el5_3.4.i386.rpm ia64: krb5-debuginfo-1.6.1-31.el5_3.4.i386.rpm krb5-debuginfo-1.6.1-31.el5_3.4.ia64.rpm krb5-devel-1.6.1-31.el5_3.4.ia64.rpm krb5-libs-1.6.1-31.el5_3.4.i386.rpm krb5-libs-1.6.1-31.el5_3.4.ia64.rpm krb5-server-1.6.1-31.el5_3.4.ia64.rpm krb5-workstation-1.6.1-31.el5_3.4.ia64.rpm ppc: krb5-debuginfo-1.6.1-31.el5_3.4.ppc.rpm krb5-debuginfo-1.6.1-31.el5_3.4.ppc64.rpm krb5-devel-1.6.1-31.el5_3.4.ppc.rpm krb5-devel-1.6.1-31.el5_3.4.ppc64.rpm krb5-libs-1.6.1-31.el5_3.4.ppc.rpm krb5-libs-1.6.1-31.el5_3.4.ppc64.rpm krb5-server-1.6.1-31.el5_3.4.ppc.rpm krb5-workstation-1.6.1-31.el5_3.4.ppc.rpm s390x: krb5-debuginfo-1.6.1-31.el5_3.4.s390.rpm krb5-debuginfo-1.6.1-31.el5_3.4.s390x.rpm krb5-devel-1.6.1-31.el5_3.4.s390.rpm krb5-devel-1.6.1-31.el5_3.4.s390x.rpm krb5-libs-1.6.1-31.el5_3.4.s390.rpm krb5-libs-1.6.1-31.el5_3.4.s390x.rpm krb5-server-1.6.1-31.el5_3.4.s390x.rpm krb5-workstation-1.6.1-31.el5_3.4.s390x.rpm x86_64: krb5-debuginfo-1.6.1-31.el5_3.4.i386.rpm krb5-debuginfo-1.6.1-31.el5_3.4.x86_64.rpm krb5-devel-1.6.1-31.el5_3.4.i386.rpm krb5-devel-1.6.1-31.el5_3.4.x86_64.rpm krb5-libs-1.6.1-31.el5_3.4.i386.rpm krb5-libs-1.6.1-31.el5_3.4.x86_64.rpm krb5-server-1.6.1-31.el5_3.4.x86_64.rpm krb5-workstation-1.6.1-31.el5_3.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-4212.html http://www.redhat.com/security/updates/classification/#critical http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-004.txt 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLTPktXlSAg2UNWIIRAlpVAJ9Zqp7/See0C4BxWY1Wh0GMi12RZwCfUS1j LynKz827bd46vBdEpOq3gVY= =4Sgs -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 13 16:47:27 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 13 Jan 2010 11:47:27 -0500 Subject: [RHSA-2010:0038-01] Critical: acroread security update Message-ID: <201001131647.o0DGlR1p030982@int-mx03.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: acroread security update Advisory ID: RHSA-2010:0038-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0038.html Issue date: 2010-01-13 CVE Names: CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3956 CVE-2009-3959 CVE-2009-4324 ===================================================================== 1. Summary: Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Desktop version 4 Extras - i386, x86_64 Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64 Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64 Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64 3. Description: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). This update fixes several vulnerabilities in Adobe Reader. These vulnerabilities are summarized on the Adobe Security Advisory APSB10-02 page listed in the References section. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2009-4324, CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3959, CVE-2009-3956) Adobe have discontinued support for Adobe Reader 8 for Linux. All users of Adobe Reader are advised to install these updated packages, which contain Adobe Reader version 9.3, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 547799 - CVE-2009-4324 acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02) 554293 - CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3959 acroread: multiple code execution flaws (APSB10-02) 554296 - CVE-2009-3956 acroread: script injection vulnerability (APSB10-02) 6. Package List: Red Hat Enterprise Linux AS version 4 Extras: i386: acroread-9.3-1.el4.i386.rpm acroread-plugin-9.3-1.el4.i386.rpm x86_64: acroread-9.3-1.el4.i386.rpm Red Hat Desktop version 4 Extras: i386: acroread-9.3-1.el4.i386.rpm acroread-plugin-9.3-1.el4.i386.rpm x86_64: acroread-9.3-1.el4.i386.rpm Red Hat Enterprise Linux ES version 4 Extras: i386: acroread-9.3-1.el4.i386.rpm acroread-plugin-9.3-1.el4.i386.rpm x86_64: acroread-9.3-1.el4.i386.rpm Red Hat Enterprise Linux WS version 4 Extras: i386: acroread-9.3-1.el4.i386.rpm acroread-plugin-9.3-1.el4.i386.rpm x86_64: acroread-9.3-1.el4.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3953.html https://www.redhat.com/security/data/cve/CVE-2009-3954.html https://www.redhat.com/security/data/cve/CVE-2009-3955.html https://www.redhat.com/security/data/cve/CVE-2009-3956.html https://www.redhat.com/security/data/cve/CVE-2009-3959.html https://www.redhat.com/security/data/cve/CVE-2009-4324.html http://www.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb10-02.html 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLTfkUXlSAg2UNWIIRAoGwAJ9M3V4us4BImTzBnIOIcbyfKiBjhACgwr8F Ve14ryUnBBhEaPrGH/11c/U= =p8xj -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 13 16:47:50 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 13 Jan 2010 11:47:50 -0500 Subject: [RHSA-2010:0037-01] Critical: acroread security and bug fix update Message-ID: <201001131647.o0DGlo9f003568@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: acroread security and bug fix update Advisory ID: RHSA-2010:0037-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0037.html Issue date: 2010-01-13 CVE Names: CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3956 CVE-2009-3959 CVE-2009-4324 ===================================================================== 1. Summary: Updated acroread packages that fix multiple security issues and three bugs are now available for Red Hat Enterprise Linux 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Supplementary (v. 5 client) - i386, x86_64 RHEL Supplementary (v. 5 server) - i386, x86_64 3. Description: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). This update fixes several vulnerabilities in Adobe Reader. These vulnerabilities are summarized on the Adobe Security Advisory APSB10-02 page listed in the References section. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2009-4324, CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3959, CVE-2009-3956) This update also fixes the following bugs: * the acroread process continued to run even after closing a PDF file. If multiple PDF files were opened and then closed, the acroread processes continued to run and consume system resources (up to 100% CPU usage). With this update, the acroread process correctly exits, which resolves this issue. (BZ#473217) * the PPKLite.api plug-in was missing, causing Adobe Reader to crash when attempting to open signed PDF files. For such files, if an immediate crash was not observed, clicking on the Signature Panel could trigger one. With this update, the PPKLite.api plug-in is included, which resolves this issue. (BZ#472975) * Adobe Reader has been upgraded to version 9.3. (BZ#497957) Adobe have discontinued support for Adobe Reader 8 for Linux. All users of Adobe Reader are advised to install these updated packages, which contain Adobe Reader version 9.3, which is not vulnerable to these issues and fixes these bugs. All running instances of Adobe Reader must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 472975 - acroread missing PPKLite.api and crashes on signed PDFs 473217 - acroread takes 100% cpu and does not die when killed 547799 - CVE-2009-4324 acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02) 554293 - CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3959 acroread: multiple code execution flaws (APSB10-02) 554296 - CVE-2009-3956 acroread: script injection vulnerability (APSB10-02) 6. Package List: RHEL Desktop Supplementary (v. 5 client): i386: acroread-9.3-1.el5.i386.rpm acroread-plugin-9.3-1.el5.i386.rpm x86_64: acroread-9.3-1.el5.i386.rpm acroread-plugin-9.3-1.el5.i386.rpm RHEL Supplementary (v. 5 server): i386: acroread-9.3-1.el5.i386.rpm acroread-plugin-9.3-1.el5.i386.rpm x86_64: acroread-9.3-1.el5.i386.rpm acroread-plugin-9.3-1.el5.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3953.html https://www.redhat.com/security/data/cve/CVE-2009-3954.html https://www.redhat.com/security/data/cve/CVE-2009-3955.html https://www.redhat.com/security/data/cve/CVE-2009-3956.html https://www.redhat.com/security/data/cve/CVE-2009-3959.html https://www.redhat.com/security/data/cve/CVE-2009-4324.html http://www.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb10-02.html 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLTfktXlSAg2UNWIIRAtxHAJ9WKDp5rvHdg6iaKnXZ6NCZPRdiIACgmsfz BO8XjHIZODRu7ZK0nPM3FaE= =983N -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 13 17:47:19 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 13 Jan 2010 12:47:19 -0500 Subject: [RHSA-2010:0039-01] Moderate: gcc and gcc4 security update Message-ID: <201001131747.o0DHlJcA021242@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gcc and gcc4 security update Advisory ID: RHSA-2010:0039-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0039.html Issue date: 2010-01-13 CVE Names: CVE-2009-3736 ===================================================================== 1. Summary: Updated gcc and gcc4 packages that fix one security issue are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The gcc and gcc4 packages include, among others, C, C++, and Java GNU compilers and related support libraries. libgcj contains a copy of GNU Libtool's libltdl library. A flaw was found in the way GNU Libtool's libltdl library looked for libraries to load. It was possible for libltdl to load a malicious library from the current working directory. In certain configurations, if a local attacker is able to trick a local user into running a Java application (which uses a function to load native libraries, such as System.loadLibrary) from within an attacker-controlled directory containing a malicious library or module, the attacker could possibly execute arbitrary code with the privileges of the user running the Java application. (CVE-2009-3736) All gcc and gcc4 users should upgrade to these updated packages, which contain a backported patch to correct this issue. All running Java applications using libgcj must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 537941 - CVE-2009-3736 libtool: libltdl may load and execute code from a library in the current directory 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gcc-3.2.3-60.src.rpm i386: cpp-3.2.3-60.i386.rpm gcc-3.2.3-60.i386.rpm gcc-c++-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-g77-3.2.3-60.i386.rpm gcc-gnat-3.2.3-60.i386.rpm gcc-java-3.2.3-60.i386.rpm gcc-objc-3.2.3-60.i386.rpm libf2c-3.2.3-60.i386.rpm libgcc-3.2.3-60.i386.rpm libgcj-3.2.3-60.i386.rpm libgcj-devel-3.2.3-60.i386.rpm libgnat-3.2.3-60.i386.rpm libobjc-3.2.3-60.i386.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.i386.rpm ia64: cpp-3.2.3-60.ia64.rpm gcc-3.2.3-60.ia64.rpm gcc-c++-3.2.3-60.ia64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.ia64.rpm gcc-g77-3.2.3-60.ia64.rpm gcc-gnat-3.2.3-60.ia64.rpm gcc-java-3.2.3-60.ia64.rpm gcc-objc-3.2.3-60.ia64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.ia64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.ia64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.ia64.rpm libgcj-devel-3.2.3-60.ia64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.ia64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.ia64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.ia64.rpm libstdc++-devel-3.2.3-60.ia64.rpm ppc: cpp-3.2.3-60.ppc.rpm gcc-3.2.3-60.ppc.rpm gcc-c++-3.2.3-60.ppc.rpm gcc-c++-ppc32-3.2.3-60.ppc.rpm gcc-debuginfo-3.2.3-60.ppc.rpm gcc-debuginfo-3.2.3-60.ppc64.rpm gcc-g77-3.2.3-60.ppc.rpm gcc-gnat-3.2.3-60.ppc.rpm gcc-java-3.2.3-60.ppc.rpm gcc-objc-3.2.3-60.ppc.rpm gcc-ppc32-3.2.3-60.ppc.rpm libf2c-3.2.3-60.ppc.rpm libf2c-3.2.3-60.ppc64.rpm libgcc-3.2.3-60.ppc.rpm libgcc-3.2.3-60.ppc64.rpm libgcj-3.2.3-60.ppc.rpm libgcj-3.2.3-60.ppc64.rpm libgcj-devel-3.2.3-60.ppc.rpm libgnat-3.2.3-60.ppc.rpm libobjc-3.2.3-60.ppc.rpm libobjc-3.2.3-60.ppc64.rpm libstdc++-3.2.3-60.ppc.rpm libstdc++-3.2.3-60.ppc64.rpm libstdc++-devel-3.2.3-60.ppc.rpm libstdc++-devel-3.2.3-60.ppc64.rpm s390: cpp-3.2.3-60.s390.rpm gcc-3.2.3-60.s390.rpm gcc-c++-3.2.3-60.s390.rpm gcc-debuginfo-3.2.3-60.s390.rpm gcc-g77-3.2.3-60.s390.rpm gcc-gnat-3.2.3-60.s390.rpm gcc-java-3.2.3-60.s390.rpm gcc-objc-3.2.3-60.s390.rpm libf2c-3.2.3-60.s390.rpm libgcc-3.2.3-60.s390.rpm libgcj-3.2.3-60.s390.rpm libgcj-devel-3.2.3-60.s390.rpm libgnat-3.2.3-60.s390.rpm libobjc-3.2.3-60.s390.rpm libstdc++-3.2.3-60.s390.rpm libstdc++-devel-3.2.3-60.s390.rpm s390x: cpp-3.2.3-60.s390x.rpm gcc-3.2.3-60.s390x.rpm gcc-c++-3.2.3-60.s390x.rpm gcc-debuginfo-3.2.3-60.s390.rpm gcc-debuginfo-3.2.3-60.s390x.rpm gcc-g77-3.2.3-60.s390x.rpm gcc-gnat-3.2.3-60.s390.rpm gcc-java-3.2.3-60.s390x.rpm gcc-objc-3.2.3-60.s390x.rpm libf2c-3.2.3-60.s390.rpm libf2c-3.2.3-60.s390x.rpm libgcc-3.2.3-60.s390.rpm libgcc-3.2.3-60.s390x.rpm libgcj-3.2.3-60.s390.rpm libgcj-3.2.3-60.s390x.rpm libgcj-devel-3.2.3-60.s390x.rpm libgnat-3.2.3-60.s390.rpm libobjc-3.2.3-60.s390.rpm libobjc-3.2.3-60.s390x.rpm libstdc++-3.2.3-60.s390.rpm libstdc++-3.2.3-60.s390x.rpm libstdc++-devel-3.2.3-60.s390.rpm libstdc++-devel-3.2.3-60.s390x.rpm x86_64: cpp-3.2.3-60.x86_64.rpm gcc-3.2.3-60.x86_64.rpm gcc-c++-3.2.3-60.x86_64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.x86_64.rpm gcc-g77-3.2.3-60.x86_64.rpm gcc-gnat-3.2.3-60.x86_64.rpm gcc-java-3.2.3-60.x86_64.rpm gcc-objc-3.2.3-60.x86_64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.x86_64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.x86_64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.x86_64.rpm libgcj-devel-3.2.3-60.x86_64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.x86_64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.x86_64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.x86_64.rpm libstdc++-devel-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gcc-3.2.3-60.src.rpm i386: cpp-3.2.3-60.i386.rpm gcc-3.2.3-60.i386.rpm gcc-c++-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-g77-3.2.3-60.i386.rpm gcc-gnat-3.2.3-60.i386.rpm gcc-java-3.2.3-60.i386.rpm gcc-objc-3.2.3-60.i386.rpm libf2c-3.2.3-60.i386.rpm libgcc-3.2.3-60.i386.rpm libgcj-3.2.3-60.i386.rpm libgcj-devel-3.2.3-60.i386.rpm libgnat-3.2.3-60.i386.rpm libobjc-3.2.3-60.i386.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.i386.rpm x86_64: cpp-3.2.3-60.x86_64.rpm gcc-3.2.3-60.x86_64.rpm gcc-c++-3.2.3-60.x86_64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.x86_64.rpm gcc-g77-3.2.3-60.x86_64.rpm gcc-gnat-3.2.3-60.x86_64.rpm gcc-java-3.2.3-60.x86_64.rpm gcc-objc-3.2.3-60.x86_64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.x86_64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.x86_64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.x86_64.rpm libgcj-devel-3.2.3-60.x86_64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.x86_64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.x86_64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.x86_64.rpm libstdc++-devel-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gcc-3.2.3-60.src.rpm i386: cpp-3.2.3-60.i386.rpm gcc-3.2.3-60.i386.rpm gcc-c++-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-g77-3.2.3-60.i386.rpm gcc-gnat-3.2.3-60.i386.rpm gcc-java-3.2.3-60.i386.rpm gcc-objc-3.2.3-60.i386.rpm libf2c-3.2.3-60.i386.rpm libgcc-3.2.3-60.i386.rpm libgcj-3.2.3-60.i386.rpm libgcj-devel-3.2.3-60.i386.rpm libgnat-3.2.3-60.i386.rpm libobjc-3.2.3-60.i386.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.i386.rpm ia64: cpp-3.2.3-60.ia64.rpm gcc-3.2.3-60.ia64.rpm gcc-c++-3.2.3-60.ia64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.ia64.rpm gcc-g77-3.2.3-60.ia64.rpm gcc-gnat-3.2.3-60.ia64.rpm gcc-java-3.2.3-60.ia64.rpm gcc-objc-3.2.3-60.ia64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.ia64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.ia64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.ia64.rpm libgcj-devel-3.2.3-60.ia64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.ia64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.ia64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.ia64.rpm libstdc++-devel-3.2.3-60.ia64.rpm x86_64: cpp-3.2.3-60.x86_64.rpm gcc-3.2.3-60.x86_64.rpm gcc-c++-3.2.3-60.x86_64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.x86_64.rpm gcc-g77-3.2.3-60.x86_64.rpm gcc-gnat-3.2.3-60.x86_64.rpm gcc-java-3.2.3-60.x86_64.rpm gcc-objc-3.2.3-60.x86_64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.x86_64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.x86_64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.x86_64.rpm libgcj-devel-3.2.3-60.x86_64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.x86_64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.x86_64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.x86_64.rpm libstdc++-devel-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gcc-3.2.3-60.src.rpm i386: cpp-3.2.3-60.i386.rpm gcc-3.2.3-60.i386.rpm gcc-c++-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-g77-3.2.3-60.i386.rpm gcc-gnat-3.2.3-60.i386.rpm gcc-java-3.2.3-60.i386.rpm gcc-objc-3.2.3-60.i386.rpm libf2c-3.2.3-60.i386.rpm libgcc-3.2.3-60.i386.rpm libgcj-3.2.3-60.i386.rpm libgcj-devel-3.2.3-60.i386.rpm libgnat-3.2.3-60.i386.rpm libobjc-3.2.3-60.i386.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.i386.rpm ia64: cpp-3.2.3-60.ia64.rpm gcc-3.2.3-60.ia64.rpm gcc-c++-3.2.3-60.ia64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.ia64.rpm gcc-g77-3.2.3-60.ia64.rpm gcc-gnat-3.2.3-60.ia64.rpm gcc-java-3.2.3-60.ia64.rpm gcc-objc-3.2.3-60.ia64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.ia64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.ia64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.ia64.rpm libgcj-devel-3.2.3-60.ia64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.ia64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.ia64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.ia64.rpm libstdc++-devel-3.2.3-60.ia64.rpm x86_64: cpp-3.2.3-60.x86_64.rpm gcc-3.2.3-60.x86_64.rpm gcc-c++-3.2.3-60.x86_64.rpm gcc-debuginfo-3.2.3-60.i386.rpm gcc-debuginfo-3.2.3-60.x86_64.rpm gcc-g77-3.2.3-60.x86_64.rpm gcc-gnat-3.2.3-60.x86_64.rpm gcc-java-3.2.3-60.x86_64.rpm gcc-objc-3.2.3-60.x86_64.rpm libf2c-3.2.3-60.i386.rpm libf2c-3.2.3-60.x86_64.rpm libgcc-3.2.3-60.i386.rpm libgcc-3.2.3-60.x86_64.rpm libgcj-3.2.3-60.i386.rpm libgcj-3.2.3-60.x86_64.rpm libgcj-devel-3.2.3-60.x86_64.rpm libgnat-3.2.3-60.i386.rpm libgnat-3.2.3-60.x86_64.rpm libobjc-3.2.3-60.i386.rpm libobjc-3.2.3-60.x86_64.rpm libstdc++-3.2.3-60.i386.rpm libstdc++-3.2.3-60.x86_64.rpm libstdc++-devel-3.2.3-60.i386.rpm libstdc++-devel-3.2.3-60.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gcc-3.4.6-11.el4_8.1.src.rpm ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gcc4-4.1.2-44.EL4_8.1.src.rpm i386: cpp-3.4.6-11.el4_8.1.i386.rpm gcc-3.4.6-11.el4_8.1.i386.rpm gcc-c++-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-g77-3.4.6-11.el4_8.1.i386.rpm gcc-gnat-3.4.6-11.el4_8.1.i386.rpm gcc-java-3.4.6-11.el4_8.1.i386.rpm gcc-objc-3.4.6-11.el4_8.1.i386.rpm gcc4-4.1.2-44.EL4_8.1.i386.rpm gcc4-c++-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.i386.rpm gcc4-java-4.1.2-44.EL4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-devel-3.4.6-11.el4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-devel-4.1.2-44.EL4_8.1.i386.rpm libgcj4-src-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-devel-4.1.2-44.EL4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm ia64: cpp-3.4.6-11.el4_8.1.ia64.rpm gcc-3.4.6-11.el4_8.1.ia64.rpm gcc-c++-3.4.6-11.el4_8.1.ia64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.ia64.rpm gcc-g77-3.4.6-11.el4_8.1.ia64.rpm gcc-gnat-3.4.6-11.el4_8.1.ia64.rpm gcc-java-3.4.6-11.el4_8.1.ia64.rpm gcc-objc-3.4.6-11.el4_8.1.ia64.rpm gcc4-4.1.2-44.EL4_8.1.ia64.rpm gcc4-c++-4.1.2-44.EL4_8.1.ia64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.ia64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.ia64.rpm gcc4-java-4.1.2-44.EL4_8.1.ia64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.ia64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.ia64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.ia64.rpm libgcj-devel-3.4.6-11.el4_8.1.ia64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-src-4.1.2-44.EL4_8.1.ia64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.ia64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.ia64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.ia64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.ia64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.ia64.rpm libstdc++-devel-3.4.6-11.el4_8.1.ia64.rpm ppc: cpp-3.4.6-11.el4_8.1.ppc.rpm gcc-3.4.6-11.el4_8.1.ppc.rpm gcc-c++-3.4.6-11.el4_8.1.ppc.rpm gcc-c++-ppc32-3.4.6-11.el4_8.1.ppc.rpm gcc-debuginfo-3.4.6-11.el4_8.1.ppc.rpm gcc-debuginfo-3.4.6-11.el4_8.1.ppc64.rpm gcc-g77-3.4.6-11.el4_8.1.ppc.rpm gcc-gnat-3.4.6-11.el4_8.1.ppc.rpm gcc-java-3.4.6-11.el4_8.1.ppc.rpm gcc-objc-3.4.6-11.el4_8.1.ppc.rpm gcc-ppc32-3.4.6-11.el4_8.1.ppc.rpm gcc4-4.1.2-44.EL4_8.1.ppc.rpm gcc4-c++-4.1.2-44.EL4_8.1.ppc.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.ppc.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.ppc64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.ppc.rpm gcc4-java-4.1.2-44.EL4_8.1.ppc.rpm libf2c-3.4.6-11.el4_8.1.ppc.rpm libf2c-3.4.6-11.el4_8.1.ppc64.rpm libgcc-3.4.6-11.el4_8.1.ppc.rpm libgcc-3.4.6-11.el4_8.1.ppc64.rpm libgcj-3.4.6-11.el4_8.1.ppc.rpm libgcj-3.4.6-11.el4_8.1.ppc64.rpm libgcj-devel-3.4.6-11.el4_8.1.ppc.rpm libgcj4-4.1.2-44.EL4_8.1.ppc.rpm libgcj4-4.1.2-44.EL4_8.1.ppc64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.ppc.rpm libgcj4-src-4.1.2-44.EL4_8.1.ppc.rpm libgfortran-4.1.2-44.EL4_8.1.ppc.rpm libgfortran-4.1.2-44.EL4_8.1.ppc64.rpm libgnat-3.4.6-11.el4_8.1.ppc.rpm libgomp-4.1.2-44.EL4_8.1.ppc.rpm libgomp-4.1.2-44.EL4_8.1.ppc64.rpm libmudflap-4.1.2-44.EL4_8.1.ppc.rpm libmudflap-4.1.2-44.EL4_8.1.ppc64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.ppc.rpm libobjc-3.4.6-11.el4_8.1.ppc.rpm libobjc-3.4.6-11.el4_8.1.ppc64.rpm libstdc++-3.4.6-11.el4_8.1.ppc.rpm libstdc++-3.4.6-11.el4_8.1.ppc64.rpm libstdc++-devel-3.4.6-11.el4_8.1.ppc.rpm libstdc++-devel-3.4.6-11.el4_8.1.ppc64.rpm s390: cpp-3.4.6-11.el4_8.1.s390.rpm gcc-3.4.6-11.el4_8.1.s390.rpm gcc-c++-3.4.6-11.el4_8.1.s390.rpm gcc-debuginfo-3.4.6-11.el4_8.1.s390.rpm gcc-g77-3.4.6-11.el4_8.1.s390.rpm gcc-gnat-3.4.6-11.el4_8.1.s390.rpm gcc-java-3.4.6-11.el4_8.1.s390.rpm gcc-objc-3.4.6-11.el4_8.1.s390.rpm gcc4-4.1.2-44.EL4_8.1.s390.rpm gcc4-c++-4.1.2-44.EL4_8.1.s390.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.s390.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.s390.rpm gcc4-java-4.1.2-44.EL4_8.1.s390.rpm libf2c-3.4.6-11.el4_8.1.s390.rpm libgcc-3.4.6-11.el4_8.1.s390.rpm libgcj-3.4.6-11.el4_8.1.s390.rpm libgcj-devel-3.4.6-11.el4_8.1.s390.rpm libgcj4-4.1.2-44.EL4_8.1.s390.rpm libgcj4-devel-4.1.2-44.EL4_8.1.s390.rpm libgcj4-src-4.1.2-44.EL4_8.1.s390.rpm libgfortran-4.1.2-44.EL4_8.1.s390.rpm libgnat-3.4.6-11.el4_8.1.s390.rpm libgomp-4.1.2-44.EL4_8.1.s390.rpm libmudflap-4.1.2-44.EL4_8.1.s390.rpm libmudflap-devel-4.1.2-44.EL4_8.1.s390.rpm libobjc-3.4.6-11.el4_8.1.s390.rpm libstdc++-3.4.6-11.el4_8.1.s390.rpm libstdc++-devel-3.4.6-11.el4_8.1.s390.rpm s390x: cpp-3.4.6-11.el4_8.1.s390x.rpm gcc-3.4.6-11.el4_8.1.s390x.rpm gcc-c++-3.4.6-11.el4_8.1.s390x.rpm gcc-debuginfo-3.4.6-11.el4_8.1.s390.rpm gcc-debuginfo-3.4.6-11.el4_8.1.s390x.rpm gcc-g77-3.4.6-11.el4_8.1.s390x.rpm gcc-java-3.4.6-11.el4_8.1.s390x.rpm gcc-objc-3.4.6-11.el4_8.1.s390x.rpm gcc4-4.1.2-44.EL4_8.1.s390x.rpm gcc4-c++-4.1.2-44.EL4_8.1.s390x.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.s390.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.s390x.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.s390x.rpm gcc4-java-4.1.2-44.EL4_8.1.s390x.rpm libf2c-3.4.6-11.el4_8.1.s390.rpm libf2c-3.4.6-11.el4_8.1.s390x.rpm libgcc-3.4.6-11.el4_8.1.s390.rpm libgcc-3.4.6-11.el4_8.1.s390x.rpm libgcj-3.4.6-11.el4_8.1.s390.rpm libgcj-3.4.6-11.el4_8.1.s390x.rpm libgcj-devel-3.4.6-11.el4_8.1.s390x.rpm libgcj4-4.1.2-44.EL4_8.1.s390.rpm libgcj4-4.1.2-44.EL4_8.1.s390x.rpm libgcj4-devel-4.1.2-44.EL4_8.1.s390x.rpm libgcj4-src-4.1.2-44.EL4_8.1.s390x.rpm libgfortran-4.1.2-44.EL4_8.1.s390.rpm libgfortran-4.1.2-44.EL4_8.1.s390x.rpm libgnat-3.4.6-11.el4_8.1.s390.rpm libgomp-4.1.2-44.EL4_8.1.s390.rpm libgomp-4.1.2-44.EL4_8.1.s390x.rpm libmudflap-4.1.2-44.EL4_8.1.s390.rpm libmudflap-4.1.2-44.EL4_8.1.s390x.rpm libmudflap-devel-4.1.2-44.EL4_8.1.s390x.rpm libobjc-3.4.6-11.el4_8.1.s390.rpm libobjc-3.4.6-11.el4_8.1.s390x.rpm libstdc++-3.4.6-11.el4_8.1.s390.rpm libstdc++-3.4.6-11.el4_8.1.s390x.rpm libstdc++-devel-3.4.6-11.el4_8.1.s390.rpm libstdc++-devel-3.4.6-11.el4_8.1.s390x.rpm x86_64: cpp-3.4.6-11.el4_8.1.x86_64.rpm gcc-3.4.6-11.el4_8.1.x86_64.rpm gcc-c++-3.4.6-11.el4_8.1.x86_64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.x86_64.rpm gcc-g77-3.4.6-11.el4_8.1.x86_64.rpm gcc-gnat-3.4.6-11.el4_8.1.x86_64.rpm gcc-java-3.4.6-11.el4_8.1.x86_64.rpm gcc-objc-3.4.6-11.el4_8.1.x86_64.rpm gcc4-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-c++-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-java-4.1.2-44.EL4_8.1.x86_64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.x86_64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.x86_64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.x86_64.rpm libgcj-devel-3.4.6-11.el4_8.1.x86_64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-src-4.1.2-44.EL4_8.1.x86_64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.x86_64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.x86_64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.x86_64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gcc-3.4.6-11.el4_8.1.src.rpm ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gcc4-4.1.2-44.EL4_8.1.src.rpm i386: cpp-3.4.6-11.el4_8.1.i386.rpm gcc-3.4.6-11.el4_8.1.i386.rpm gcc-c++-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-g77-3.4.6-11.el4_8.1.i386.rpm gcc-gnat-3.4.6-11.el4_8.1.i386.rpm gcc-java-3.4.6-11.el4_8.1.i386.rpm gcc-objc-3.4.6-11.el4_8.1.i386.rpm gcc4-4.1.2-44.EL4_8.1.i386.rpm gcc4-c++-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.i386.rpm gcc4-java-4.1.2-44.EL4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-devel-3.4.6-11.el4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-devel-4.1.2-44.EL4_8.1.i386.rpm libgcj4-src-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-devel-4.1.2-44.EL4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm x86_64: cpp-3.4.6-11.el4_8.1.x86_64.rpm gcc-3.4.6-11.el4_8.1.x86_64.rpm gcc-c++-3.4.6-11.el4_8.1.x86_64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.x86_64.rpm gcc-g77-3.4.6-11.el4_8.1.x86_64.rpm gcc-gnat-3.4.6-11.el4_8.1.x86_64.rpm gcc-java-3.4.6-11.el4_8.1.x86_64.rpm gcc-objc-3.4.6-11.el4_8.1.x86_64.rpm gcc4-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-c++-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-java-4.1.2-44.EL4_8.1.x86_64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.x86_64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.x86_64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.x86_64.rpm libgcj-devel-3.4.6-11.el4_8.1.x86_64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-src-4.1.2-44.EL4_8.1.x86_64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.x86_64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.x86_64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.x86_64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gcc-3.4.6-11.el4_8.1.src.rpm ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gcc4-4.1.2-44.EL4_8.1.src.rpm i386: cpp-3.4.6-11.el4_8.1.i386.rpm gcc-3.4.6-11.el4_8.1.i386.rpm gcc-c++-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-g77-3.4.6-11.el4_8.1.i386.rpm gcc-gnat-3.4.6-11.el4_8.1.i386.rpm gcc-java-3.4.6-11.el4_8.1.i386.rpm gcc-objc-3.4.6-11.el4_8.1.i386.rpm gcc4-4.1.2-44.EL4_8.1.i386.rpm gcc4-c++-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.i386.rpm gcc4-java-4.1.2-44.EL4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-devel-3.4.6-11.el4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-devel-4.1.2-44.EL4_8.1.i386.rpm libgcj4-src-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-devel-4.1.2-44.EL4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm ia64: cpp-3.4.6-11.el4_8.1.ia64.rpm gcc-3.4.6-11.el4_8.1.ia64.rpm gcc-c++-3.4.6-11.el4_8.1.ia64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.ia64.rpm gcc-g77-3.4.6-11.el4_8.1.ia64.rpm gcc-gnat-3.4.6-11.el4_8.1.ia64.rpm gcc-java-3.4.6-11.el4_8.1.ia64.rpm gcc-objc-3.4.6-11.el4_8.1.ia64.rpm gcc4-4.1.2-44.EL4_8.1.ia64.rpm gcc4-c++-4.1.2-44.EL4_8.1.ia64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.ia64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.ia64.rpm gcc4-java-4.1.2-44.EL4_8.1.ia64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.ia64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.ia64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.ia64.rpm libgcj-devel-3.4.6-11.el4_8.1.ia64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-src-4.1.2-44.EL4_8.1.ia64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.ia64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.ia64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.ia64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.ia64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.ia64.rpm libstdc++-devel-3.4.6-11.el4_8.1.ia64.rpm x86_64: cpp-3.4.6-11.el4_8.1.x86_64.rpm gcc-3.4.6-11.el4_8.1.x86_64.rpm gcc-c++-3.4.6-11.el4_8.1.x86_64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.x86_64.rpm gcc-g77-3.4.6-11.el4_8.1.x86_64.rpm gcc-gnat-3.4.6-11.el4_8.1.x86_64.rpm gcc-java-3.4.6-11.el4_8.1.x86_64.rpm gcc-objc-3.4.6-11.el4_8.1.x86_64.rpm gcc4-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-c++-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-java-4.1.2-44.EL4_8.1.x86_64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.x86_64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.x86_64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.x86_64.rpm libgcj-devel-3.4.6-11.el4_8.1.x86_64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-src-4.1.2-44.EL4_8.1.x86_64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.x86_64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.x86_64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.x86_64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gcc-3.4.6-11.el4_8.1.src.rpm ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gcc4-4.1.2-44.EL4_8.1.src.rpm i386: cpp-3.4.6-11.el4_8.1.i386.rpm gcc-3.4.6-11.el4_8.1.i386.rpm gcc-c++-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-g77-3.4.6-11.el4_8.1.i386.rpm gcc-gnat-3.4.6-11.el4_8.1.i386.rpm gcc-java-3.4.6-11.el4_8.1.i386.rpm gcc-objc-3.4.6-11.el4_8.1.i386.rpm gcc4-4.1.2-44.EL4_8.1.i386.rpm gcc4-c++-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.i386.rpm gcc4-java-4.1.2-44.EL4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-devel-3.4.6-11.el4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-devel-4.1.2-44.EL4_8.1.i386.rpm libgcj4-src-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-devel-4.1.2-44.EL4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm ia64: cpp-3.4.6-11.el4_8.1.ia64.rpm gcc-3.4.6-11.el4_8.1.ia64.rpm gcc-c++-3.4.6-11.el4_8.1.ia64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.ia64.rpm gcc-g77-3.4.6-11.el4_8.1.ia64.rpm gcc-gnat-3.4.6-11.el4_8.1.ia64.rpm gcc-java-3.4.6-11.el4_8.1.ia64.rpm gcc-objc-3.4.6-11.el4_8.1.ia64.rpm gcc4-4.1.2-44.EL4_8.1.ia64.rpm gcc4-c++-4.1.2-44.EL4_8.1.ia64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.ia64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.ia64.rpm gcc4-java-4.1.2-44.EL4_8.1.ia64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.ia64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.ia64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.ia64.rpm libgcj-devel-3.4.6-11.el4_8.1.ia64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.ia64.rpm libgcj4-src-4.1.2-44.EL4_8.1.ia64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.ia64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.ia64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.ia64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.ia64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.ia64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.ia64.rpm libstdc++-devel-3.4.6-11.el4_8.1.ia64.rpm x86_64: cpp-3.4.6-11.el4_8.1.x86_64.rpm gcc-3.4.6-11.el4_8.1.x86_64.rpm gcc-c++-3.4.6-11.el4_8.1.x86_64.rpm gcc-debuginfo-3.4.6-11.el4_8.1.i386.rpm gcc-debuginfo-3.4.6-11.el4_8.1.x86_64.rpm gcc-g77-3.4.6-11.el4_8.1.x86_64.rpm gcc-gnat-3.4.6-11.el4_8.1.x86_64.rpm gcc-java-3.4.6-11.el4_8.1.x86_64.rpm gcc-objc-3.4.6-11.el4_8.1.x86_64.rpm gcc4-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-c++-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.i386.rpm gcc4-debuginfo-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-gfortran-4.1.2-44.EL4_8.1.x86_64.rpm gcc4-java-4.1.2-44.EL4_8.1.x86_64.rpm libf2c-3.4.6-11.el4_8.1.i386.rpm libf2c-3.4.6-11.el4_8.1.x86_64.rpm libgcc-3.4.6-11.el4_8.1.i386.rpm libgcc-3.4.6-11.el4_8.1.x86_64.rpm libgcj-3.4.6-11.el4_8.1.i386.rpm libgcj-3.4.6-11.el4_8.1.x86_64.rpm libgcj-devel-3.4.6-11.el4_8.1.x86_64.rpm libgcj4-4.1.2-44.EL4_8.1.i386.rpm libgcj4-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-devel-4.1.2-44.EL4_8.1.x86_64.rpm libgcj4-src-4.1.2-44.EL4_8.1.x86_64.rpm libgfortran-4.1.2-44.EL4_8.1.i386.rpm libgfortran-4.1.2-44.EL4_8.1.x86_64.rpm libgnat-3.4.6-11.el4_8.1.i386.rpm libgnat-3.4.6-11.el4_8.1.x86_64.rpm libgomp-4.1.2-44.EL4_8.1.i386.rpm libgomp-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-4.1.2-44.EL4_8.1.i386.rpm libmudflap-4.1.2-44.EL4_8.1.x86_64.rpm libmudflap-devel-4.1.2-44.EL4_8.1.x86_64.rpm libobjc-3.4.6-11.el4_8.1.i386.rpm libobjc-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-3.4.6-11.el4_8.1.i386.rpm libstdc++-3.4.6-11.el4_8.1.x86_64.rpm libstdc++-devel-3.4.6-11.el4_8.1.i386.rpm libstdc++-devel-3.4.6-11.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gcc-4.1.2-46.el5_4.2.src.rpm i386: cpp-4.1.2-46.el5_4.2.i386.rpm gcc-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm libgcc-4.1.2-46.el5_4.2.i386.rpm libgcj-4.1.2-46.el5_4.2.i386.rpm libgfortran-4.1.2-46.el5_4.2.i386.rpm libgnat-4.1.2-46.el5_4.2.i386.rpm libmudflap-4.1.2-46.el5_4.2.i386.rpm libobjc-4.1.2-46.el5_4.2.i386.rpm libstdc++-4.1.2-46.el5_4.2.i386.rpm x86_64: cpp-4.1.2-46.el5_4.2.x86_64.rpm gcc-4.1.2-46.el5_4.2.x86_64.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.x86_64.rpm libgcc-4.1.2-46.el5_4.2.i386.rpm libgcc-4.1.2-46.el5_4.2.x86_64.rpm libgcj-4.1.2-46.el5_4.2.i386.rpm libgcj-4.1.2-46.el5_4.2.x86_64.rpm libgfortran-4.1.2-46.el5_4.2.i386.rpm libgfortran-4.1.2-46.el5_4.2.x86_64.rpm libgnat-4.1.2-46.el5_4.2.i386.rpm libgnat-4.1.2-46.el5_4.2.x86_64.rpm libmudflap-4.1.2-46.el5_4.2.i386.rpm libmudflap-4.1.2-46.el5_4.2.x86_64.rpm libobjc-4.1.2-46.el5_4.2.i386.rpm libobjc-4.1.2-46.el5_4.2.x86_64.rpm libstdc++-4.1.2-46.el5_4.2.i386.rpm libstdc++-4.1.2-46.el5_4.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gcc-4.1.2-46.el5_4.2.src.rpm i386: gcc-c++-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-gfortran-4.1.2-46.el5_4.2.i386.rpm gcc-gnat-4.1.2-46.el5_4.2.i386.rpm gcc-java-4.1.2-46.el5_4.2.i386.rpm gcc-objc++-4.1.2-46.el5_4.2.i386.rpm gcc-objc-4.1.2-46.el5_4.2.i386.rpm libgcj-devel-4.1.2-46.el5_4.2.i386.rpm libgcj-src-4.1.2-46.el5_4.2.i386.rpm libmudflap-devel-4.1.2-46.el5_4.2.i386.rpm libstdc++-devel-4.1.2-46.el5_4.2.i386.rpm x86_64: gcc-c++-4.1.2-46.el5_4.2.x86_64.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.x86_64.rpm gcc-gfortran-4.1.2-46.el5_4.2.x86_64.rpm gcc-gnat-4.1.2-46.el5_4.2.x86_64.rpm gcc-java-4.1.2-46.el5_4.2.x86_64.rpm gcc-objc++-4.1.2-46.el5_4.2.x86_64.rpm gcc-objc-4.1.2-46.el5_4.2.x86_64.rpm libgcj-devel-4.1.2-46.el5_4.2.i386.rpm libgcj-devel-4.1.2-46.el5_4.2.x86_64.rpm libgcj-src-4.1.2-46.el5_4.2.x86_64.rpm libmudflap-devel-4.1.2-46.el5_4.2.i386.rpm libmudflap-devel-4.1.2-46.el5_4.2.x86_64.rpm libstdc++-devel-4.1.2-46.el5_4.2.i386.rpm libstdc++-devel-4.1.2-46.el5_4.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gcc-4.1.2-46.el5_4.2.src.rpm i386: cpp-4.1.2-46.el5_4.2.i386.rpm gcc-4.1.2-46.el5_4.2.i386.rpm gcc-c++-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-gfortran-4.1.2-46.el5_4.2.i386.rpm gcc-gnat-4.1.2-46.el5_4.2.i386.rpm gcc-java-4.1.2-46.el5_4.2.i386.rpm gcc-objc++-4.1.2-46.el5_4.2.i386.rpm gcc-objc-4.1.2-46.el5_4.2.i386.rpm libgcc-4.1.2-46.el5_4.2.i386.rpm libgcj-4.1.2-46.el5_4.2.i386.rpm libgcj-devel-4.1.2-46.el5_4.2.i386.rpm libgcj-src-4.1.2-46.el5_4.2.i386.rpm libgfortran-4.1.2-46.el5_4.2.i386.rpm libgnat-4.1.2-46.el5_4.2.i386.rpm libmudflap-4.1.2-46.el5_4.2.i386.rpm libmudflap-devel-4.1.2-46.el5_4.2.i386.rpm libobjc-4.1.2-46.el5_4.2.i386.rpm libstdc++-4.1.2-46.el5_4.2.i386.rpm libstdc++-devel-4.1.2-46.el5_4.2.i386.rpm ia64: cpp-4.1.2-46.el5_4.2.ia64.rpm gcc-4.1.2-46.el5_4.2.ia64.rpm gcc-c++-4.1.2-46.el5_4.2.ia64.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.ia64.rpm gcc-gfortran-4.1.2-46.el5_4.2.ia64.rpm gcc-gnat-4.1.2-46.el5_4.2.ia64.rpm gcc-java-4.1.2-46.el5_4.2.ia64.rpm gcc-objc++-4.1.2-46.el5_4.2.ia64.rpm gcc-objc-4.1.2-46.el5_4.2.ia64.rpm libgcc-4.1.2-46.el5_4.2.i386.rpm libgcc-4.1.2-46.el5_4.2.ia64.rpm libgcj-4.1.2-46.el5_4.2.ia64.rpm libgcj-devel-4.1.2-46.el5_4.2.ia64.rpm libgcj-src-4.1.2-46.el5_4.2.ia64.rpm libgfortran-4.1.2-46.el5_4.2.ia64.rpm libgnat-4.1.2-46.el5_4.2.i386.rpm libgnat-4.1.2-46.el5_4.2.ia64.rpm libmudflap-4.1.2-46.el5_4.2.ia64.rpm libmudflap-devel-4.1.2-46.el5_4.2.ia64.rpm libobjc-4.1.2-46.el5_4.2.i386.rpm libobjc-4.1.2-46.el5_4.2.ia64.rpm libstdc++-4.1.2-46.el5_4.2.i386.rpm libstdc++-4.1.2-46.el5_4.2.ia64.rpm libstdc++-devel-4.1.2-46.el5_4.2.ia64.rpm ppc: cpp-4.1.2-46.el5_4.2.ppc.rpm gcc-4.1.2-46.el5_4.2.ppc.rpm gcc-c++-4.1.2-46.el5_4.2.ppc.rpm gcc-debuginfo-4.1.2-46.el5_4.2.ppc.rpm gcc-debuginfo-4.1.2-46.el5_4.2.ppc64.rpm gcc-gfortran-4.1.2-46.el5_4.2.ppc.rpm gcc-java-4.1.2-46.el5_4.2.ppc.rpm gcc-objc++-4.1.2-46.el5_4.2.ppc.rpm gcc-objc-4.1.2-46.el5_4.2.ppc.rpm libgcc-4.1.2-46.el5_4.2.ppc.rpm libgcc-4.1.2-46.el5_4.2.ppc64.rpm libgcj-4.1.2-46.el5_4.2.ppc.rpm libgcj-4.1.2-46.el5_4.2.ppc64.rpm libgcj-devel-4.1.2-46.el5_4.2.ppc.rpm libgcj-devel-4.1.2-46.el5_4.2.ppc64.rpm libgcj-src-4.1.2-46.el5_4.2.ppc.rpm libgfortran-4.1.2-46.el5_4.2.ppc.rpm libgfortran-4.1.2-46.el5_4.2.ppc64.rpm libmudflap-4.1.2-46.el5_4.2.ppc.rpm libmudflap-4.1.2-46.el5_4.2.ppc64.rpm libmudflap-devel-4.1.2-46.el5_4.2.ppc.rpm libmudflap-devel-4.1.2-46.el5_4.2.ppc64.rpm libobjc-4.1.2-46.el5_4.2.ppc.rpm libobjc-4.1.2-46.el5_4.2.ppc64.rpm libstdc++-4.1.2-46.el5_4.2.ppc.rpm libstdc++-4.1.2-46.el5_4.2.ppc64.rpm libstdc++-devel-4.1.2-46.el5_4.2.ppc.rpm libstdc++-devel-4.1.2-46.el5_4.2.ppc64.rpm s390x: cpp-4.1.2-46.el5_4.2.s390x.rpm gcc-4.1.2-46.el5_4.2.s390x.rpm gcc-c++-4.1.2-46.el5_4.2.s390x.rpm gcc-debuginfo-4.1.2-46.el5_4.2.s390.rpm gcc-debuginfo-4.1.2-46.el5_4.2.s390x.rpm gcc-gfortran-4.1.2-46.el5_4.2.s390x.rpm gcc-java-4.1.2-46.el5_4.2.s390x.rpm gcc-objc++-4.1.2-46.el5_4.2.s390x.rpm gcc-objc-4.1.2-46.el5_4.2.s390x.rpm libgcc-4.1.2-46.el5_4.2.s390.rpm libgcc-4.1.2-46.el5_4.2.s390x.rpm libgcj-4.1.2-46.el5_4.2.s390.rpm libgcj-4.1.2-46.el5_4.2.s390x.rpm libgcj-devel-4.1.2-46.el5_4.2.s390.rpm libgcj-devel-4.1.2-46.el5_4.2.s390x.rpm libgcj-src-4.1.2-46.el5_4.2.s390x.rpm libgfortran-4.1.2-46.el5_4.2.s390.rpm libgfortran-4.1.2-46.el5_4.2.s390x.rpm libmudflap-4.1.2-46.el5_4.2.s390.rpm libmudflap-4.1.2-46.el5_4.2.s390x.rpm libmudflap-devel-4.1.2-46.el5_4.2.s390.rpm libmudflap-devel-4.1.2-46.el5_4.2.s390x.rpm libobjc-4.1.2-46.el5_4.2.s390.rpm libobjc-4.1.2-46.el5_4.2.s390x.rpm libstdc++-4.1.2-46.el5_4.2.s390.rpm libstdc++-4.1.2-46.el5_4.2.s390x.rpm libstdc++-devel-4.1.2-46.el5_4.2.s390.rpm libstdc++-devel-4.1.2-46.el5_4.2.s390x.rpm x86_64: cpp-4.1.2-46.el5_4.2.x86_64.rpm gcc-4.1.2-46.el5_4.2.x86_64.rpm gcc-c++-4.1.2-46.el5_4.2.x86_64.rpm gcc-debuginfo-4.1.2-46.el5_4.2.i386.rpm gcc-debuginfo-4.1.2-46.el5_4.2.x86_64.rpm gcc-gfortran-4.1.2-46.el5_4.2.x86_64.rpm gcc-gnat-4.1.2-46.el5_4.2.x86_64.rpm gcc-java-4.1.2-46.el5_4.2.x86_64.rpm gcc-objc++-4.1.2-46.el5_4.2.x86_64.rpm gcc-objc-4.1.2-46.el5_4.2.x86_64.rpm libgcc-4.1.2-46.el5_4.2.i386.rpm libgcc-4.1.2-46.el5_4.2.x86_64.rpm libgcj-4.1.2-46.el5_4.2.i386.rpm libgcj-4.1.2-46.el5_4.2.x86_64.rpm libgcj-devel-4.1.2-46.el5_4.2.i386.rpm libgcj-devel-4.1.2-46.el5_4.2.x86_64.rpm libgcj-src-4.1.2-46.el5_4.2.x86_64.rpm libgfortran-4.1.2-46.el5_4.2.i386.rpm libgfortran-4.1.2-46.el5_4.2.x86_64.rpm libgnat-4.1.2-46.el5_4.2.i386.rpm libgnat-4.1.2-46.el5_4.2.x86_64.rpm libmudflap-4.1.2-46.el5_4.2.i386.rpm libmudflap-4.1.2-46.el5_4.2.x86_64.rpm libmudflap-devel-4.1.2-46.el5_4.2.i386.rpm libmudflap-devel-4.1.2-46.el5_4.2.x86_64.rpm libobjc-4.1.2-46.el5_4.2.i386.rpm libobjc-4.1.2-46.el5_4.2.x86_64.rpm libstdc++-4.1.2-46.el5_4.2.i386.rpm libstdc++-4.1.2-46.el5_4.2.x86_64.rpm libstdc++-devel-4.1.2-46.el5_4.2.i386.rpm libstdc++-devel-4.1.2-46.el5_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3736.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLTgcYXlSAg2UNWIIRAm4YAKCG6yJCZ/gIkpIjacfQRwAXsZLVgACfZIHB 854SmB/IxsfYM1x6KdMJ5C8= =jIsz -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 13 18:15:15 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 13 Jan 2010 13:15:15 -0500 Subject: [RHSA-2010:0040-01] Moderate: php security update Message-ID: <201001131815.o0DIFGjM003650@int-mx04.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: php security update Advisory ID: RHSA-2010:0040-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0040.html Issue date: 2010-01-13 CVE Names: CVE-2009-2687 CVE-2009-3291 CVE-2009-3292 CVE-2009-3546 CVE-2009-4017 CVE-2009-4142 ===================================================================== 1. Summary: Updated php packages that fix several security issues are now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server. Multiple missing input sanitization flaws were discovered in PHP's exif extension. A specially-crafted image file could cause the PHP interpreter to crash or, possibly, disclose portions of its memory when a PHP script tried to extract Exchangeable image file format (Exif) metadata from the image file. (CVE-2009-2687, CVE-2009-3292) A missing input sanitization flaw, leading to a buffer overflow, was discovered in PHP's gd library. A specially-crafted GD image file could cause the PHP interpreter to crash or, possibly, execute arbitrary code when opened. (CVE-2009-3546) It was discovered that PHP did not limit the maximum number of files that can be uploaded in one request. A remote attacker could use this flaw to instigate a denial of service by causing the PHP interpreter to use lots of system resources dealing with requests containing large amounts of files to be uploaded. This vulnerability depends on file uploads being enabled (which it is, in the default PHP configuration). (CVE-2009-4017) Note: This update introduces a new configuration option, max_file_uploads, used for limiting the number of files that can be uploaded in one request. By default, the limit is 20 files per request. It was discovered that PHP was affected by the previously published "null prefix attack", caused by incorrect handling of NUL characters in X.509 certificates. If an attacker is able to get a carefully-crafted certificate signed by a trusted Certificate Authority, the attacker could use the certificate during a man-in-the-middle attack and potentially confuse PHP into accepting it by mistake. (CVE-2009-3291) It was discovered that PHP's htmlspecialchars() function did not properly recognize partial multi-byte sequences for some multi-byte encodings, sending them to output without them being escaped. An attacker could use this flaw to perform a cross-site scripting attack. (CVE-2009-4142) All php users should upgrade to these updated packages, which contain backported patches to resolve these issues. After installing the updated packages, the httpd daemon must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 506896 - CVE-2009-2687 php: exif_read_data crash on corrupted JPEG files 524222 - CVE-2009-3292 php: exif extension: Multiple missing sanity checks in EXIF file processing 524228 - CVE-2009-3291 php: openssl extension: Incorrect verification of SSL certificate with NUL in name 529213 - CVE-2009-3546 gd: insufficient input validation in _gdGetColors() 540459 - CVE-2009-4017 PHP: resource exhaustion attack via upload requests with lots of files 548516 - CVE-2009-4142 php: htmlspecialchars() insufficient checking of input for multi-byte encodings 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/php-4.3.2-54.ent.src.rpm i386: php-4.3.2-54.ent.i386.rpm php-debuginfo-4.3.2-54.ent.i386.rpm php-devel-4.3.2-54.ent.i386.rpm php-imap-4.3.2-54.ent.i386.rpm php-ldap-4.3.2-54.ent.i386.rpm php-mysql-4.3.2-54.ent.i386.rpm php-odbc-4.3.2-54.ent.i386.rpm php-pgsql-4.3.2-54.ent.i386.rpm ia64: php-4.3.2-54.ent.ia64.rpm php-debuginfo-4.3.2-54.ent.ia64.rpm php-devel-4.3.2-54.ent.ia64.rpm php-imap-4.3.2-54.ent.ia64.rpm php-ldap-4.3.2-54.ent.ia64.rpm php-mysql-4.3.2-54.ent.ia64.rpm php-odbc-4.3.2-54.ent.ia64.rpm php-pgsql-4.3.2-54.ent.ia64.rpm ppc: php-4.3.2-54.ent.ppc.rpm php-debuginfo-4.3.2-54.ent.ppc.rpm php-devel-4.3.2-54.ent.ppc.rpm php-imap-4.3.2-54.ent.ppc.rpm php-ldap-4.3.2-54.ent.ppc.rpm php-mysql-4.3.2-54.ent.ppc.rpm php-odbc-4.3.2-54.ent.ppc.rpm php-pgsql-4.3.2-54.ent.ppc.rpm s390: php-4.3.2-54.ent.s390.rpm php-debuginfo-4.3.2-54.ent.s390.rpm php-devel-4.3.2-54.ent.s390.rpm php-imap-4.3.2-54.ent.s390.rpm php-ldap-4.3.2-54.ent.s390.rpm php-mysql-4.3.2-54.ent.s390.rpm php-odbc-4.3.2-54.ent.s390.rpm php-pgsql-4.3.2-54.ent.s390.rpm s390x: php-4.3.2-54.ent.s390x.rpm php-debuginfo-4.3.2-54.ent.s390x.rpm php-devel-4.3.2-54.ent.s390x.rpm php-imap-4.3.2-54.ent.s390x.rpm php-ldap-4.3.2-54.ent.s390x.rpm php-mysql-4.3.2-54.ent.s390x.rpm php-odbc-4.3.2-54.ent.s390x.rpm php-pgsql-4.3.2-54.ent.s390x.rpm x86_64: php-4.3.2-54.ent.x86_64.rpm php-debuginfo-4.3.2-54.ent.x86_64.rpm php-devel-4.3.2-54.ent.x86_64.rpm php-imap-4.3.2-54.ent.x86_64.rpm php-ldap-4.3.2-54.ent.x86_64.rpm php-mysql-4.3.2-54.ent.x86_64.rpm php-odbc-4.3.2-54.ent.x86_64.rpm php-pgsql-4.3.2-54.ent.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/php-4.3.2-54.ent.src.rpm i386: php-4.3.2-54.ent.i386.rpm php-debuginfo-4.3.2-54.ent.i386.rpm php-devel-4.3.2-54.ent.i386.rpm php-imap-4.3.2-54.ent.i386.rpm php-ldap-4.3.2-54.ent.i386.rpm php-mysql-4.3.2-54.ent.i386.rpm php-odbc-4.3.2-54.ent.i386.rpm php-pgsql-4.3.2-54.ent.i386.rpm x86_64: php-4.3.2-54.ent.x86_64.rpm php-debuginfo-4.3.2-54.ent.x86_64.rpm php-devel-4.3.2-54.ent.x86_64.rpm php-imap-4.3.2-54.ent.x86_64.rpm php-ldap-4.3.2-54.ent.x86_64.rpm php-mysql-4.3.2-54.ent.x86_64.rpm php-odbc-4.3.2-54.ent.x86_64.rpm php-pgsql-4.3.2-54.ent.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/php-4.3.2-54.ent.src.rpm i386: php-4.3.2-54.ent.i386.rpm php-debuginfo-4.3.2-54.ent.i386.rpm php-devel-4.3.2-54.ent.i386.rpm php-imap-4.3.2-54.ent.i386.rpm php-ldap-4.3.2-54.ent.i386.rpm php-mysql-4.3.2-54.ent.i386.rpm php-odbc-4.3.2-54.ent.i386.rpm php-pgsql-4.3.2-54.ent.i386.rpm ia64: php-4.3.2-54.ent.ia64.rpm php-debuginfo-4.3.2-54.ent.ia64.rpm php-devel-4.3.2-54.ent.ia64.rpm php-imap-4.3.2-54.ent.ia64.rpm php-ldap-4.3.2-54.ent.ia64.rpm php-mysql-4.3.2-54.ent.ia64.rpm php-odbc-4.3.2-54.ent.ia64.rpm php-pgsql-4.3.2-54.ent.ia64.rpm x86_64: php-4.3.2-54.ent.x86_64.rpm php-debuginfo-4.3.2-54.ent.x86_64.rpm php-devel-4.3.2-54.ent.x86_64.rpm php-imap-4.3.2-54.ent.x86_64.rpm php-ldap-4.3.2-54.ent.x86_64.rpm php-mysql-4.3.2-54.ent.x86_64.rpm php-odbc-4.3.2-54.ent.x86_64.rpm php-pgsql-4.3.2-54.ent.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/php-4.3.2-54.ent.src.rpm i386: php-4.3.2-54.ent.i386.rpm php-debuginfo-4.3.2-54.ent.i386.rpm php-devel-4.3.2-54.ent.i386.rpm php-imap-4.3.2-54.ent.i386.rpm php-ldap-4.3.2-54.ent.i386.rpm php-mysql-4.3.2-54.ent.i386.rpm php-odbc-4.3.2-54.ent.i386.rpm php-pgsql-4.3.2-54.ent.i386.rpm ia64: php-4.3.2-54.ent.ia64.rpm php-debuginfo-4.3.2-54.ent.ia64.rpm php-devel-4.3.2-54.ent.ia64.rpm php-imap-4.3.2-54.ent.ia64.rpm php-ldap-4.3.2-54.ent.ia64.rpm php-mysql-4.3.2-54.ent.ia64.rpm php-odbc-4.3.2-54.ent.ia64.rpm php-pgsql-4.3.2-54.ent.ia64.rpm x86_64: php-4.3.2-54.ent.x86_64.rpm php-debuginfo-4.3.2-54.ent.x86_64.rpm php-devel-4.3.2-54.ent.x86_64.rpm php-imap-4.3.2-54.ent.x86_64.rpm php-ldap-4.3.2-54.ent.x86_64.rpm php-mysql-4.3.2-54.ent.x86_64.rpm php-odbc-4.3.2-54.ent.x86_64.rpm php-pgsql-4.3.2-54.ent.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/php-4.3.9-3.29.src.rpm i386: php-4.3.9-3.29.i386.rpm php-debuginfo-4.3.9-3.29.i386.rpm php-devel-4.3.9-3.29.i386.rpm php-domxml-4.3.9-3.29.i386.rpm php-gd-4.3.9-3.29.i386.rpm php-imap-4.3.9-3.29.i386.rpm php-ldap-4.3.9-3.29.i386.rpm php-mbstring-4.3.9-3.29.i386.rpm php-mysql-4.3.9-3.29.i386.rpm php-ncurses-4.3.9-3.29.i386.rpm php-odbc-4.3.9-3.29.i386.rpm php-pear-4.3.9-3.29.i386.rpm php-pgsql-4.3.9-3.29.i386.rpm php-snmp-4.3.9-3.29.i386.rpm php-xmlrpc-4.3.9-3.29.i386.rpm ia64: php-4.3.9-3.29.ia64.rpm php-debuginfo-4.3.9-3.29.ia64.rpm php-devel-4.3.9-3.29.ia64.rpm php-domxml-4.3.9-3.29.ia64.rpm php-gd-4.3.9-3.29.ia64.rpm php-imap-4.3.9-3.29.ia64.rpm php-ldap-4.3.9-3.29.ia64.rpm php-mbstring-4.3.9-3.29.ia64.rpm php-mysql-4.3.9-3.29.ia64.rpm php-ncurses-4.3.9-3.29.ia64.rpm php-odbc-4.3.9-3.29.ia64.rpm php-pear-4.3.9-3.29.ia64.rpm php-pgsql-4.3.9-3.29.ia64.rpm php-snmp-4.3.9-3.29.ia64.rpm php-xmlrpc-4.3.9-3.29.ia64.rpm ppc: php-4.3.9-3.29.ppc.rpm php-debuginfo-4.3.9-3.29.ppc.rpm php-devel-4.3.9-3.29.ppc.rpm php-domxml-4.3.9-3.29.ppc.rpm php-gd-4.3.9-3.29.ppc.rpm php-imap-4.3.9-3.29.ppc.rpm php-ldap-4.3.9-3.29.ppc.rpm php-mbstring-4.3.9-3.29.ppc.rpm php-mysql-4.3.9-3.29.ppc.rpm php-ncurses-4.3.9-3.29.ppc.rpm php-odbc-4.3.9-3.29.ppc.rpm php-pear-4.3.9-3.29.ppc.rpm php-pgsql-4.3.9-3.29.ppc.rpm php-snmp-4.3.9-3.29.ppc.rpm php-xmlrpc-4.3.9-3.29.ppc.rpm s390: php-4.3.9-3.29.s390.rpm php-debuginfo-4.3.9-3.29.s390.rpm php-devel-4.3.9-3.29.s390.rpm php-domxml-4.3.9-3.29.s390.rpm php-gd-4.3.9-3.29.s390.rpm php-imap-4.3.9-3.29.s390.rpm php-ldap-4.3.9-3.29.s390.rpm php-mbstring-4.3.9-3.29.s390.rpm php-mysql-4.3.9-3.29.s390.rpm php-ncurses-4.3.9-3.29.s390.rpm php-odbc-4.3.9-3.29.s390.rpm php-pear-4.3.9-3.29.s390.rpm php-pgsql-4.3.9-3.29.s390.rpm php-snmp-4.3.9-3.29.s390.rpm php-xmlrpc-4.3.9-3.29.s390.rpm s390x: php-4.3.9-3.29.s390x.rpm php-debuginfo-4.3.9-3.29.s390x.rpm php-devel-4.3.9-3.29.s390x.rpm php-domxml-4.3.9-3.29.s390x.rpm php-gd-4.3.9-3.29.s390x.rpm php-imap-4.3.9-3.29.s390x.rpm php-ldap-4.3.9-3.29.s390x.rpm php-mbstring-4.3.9-3.29.s390x.rpm php-mysql-4.3.9-3.29.s390x.rpm php-ncurses-4.3.9-3.29.s390x.rpm php-odbc-4.3.9-3.29.s390x.rpm php-pear-4.3.9-3.29.s390x.rpm php-pgsql-4.3.9-3.29.s390x.rpm php-snmp-4.3.9-3.29.s390x.rpm php-xmlrpc-4.3.9-3.29.s390x.rpm x86_64: php-4.3.9-3.29.x86_64.rpm php-debuginfo-4.3.9-3.29.x86_64.rpm php-devel-4.3.9-3.29.x86_64.rpm php-domxml-4.3.9-3.29.x86_64.rpm php-gd-4.3.9-3.29.x86_64.rpm php-imap-4.3.9-3.29.x86_64.rpm php-ldap-4.3.9-3.29.x86_64.rpm php-mbstring-4.3.9-3.29.x86_64.rpm php-mysql-4.3.9-3.29.x86_64.rpm php-ncurses-4.3.9-3.29.x86_64.rpm php-odbc-4.3.9-3.29.x86_64.rpm php-pear-4.3.9-3.29.x86_64.rpm php-pgsql-4.3.9-3.29.x86_64.rpm php-snmp-4.3.9-3.29.x86_64.rpm php-xmlrpc-4.3.9-3.29.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/php-4.3.9-3.29.src.rpm i386: php-4.3.9-3.29.i386.rpm php-debuginfo-4.3.9-3.29.i386.rpm php-devel-4.3.9-3.29.i386.rpm php-domxml-4.3.9-3.29.i386.rpm php-gd-4.3.9-3.29.i386.rpm php-imap-4.3.9-3.29.i386.rpm php-ldap-4.3.9-3.29.i386.rpm php-mbstring-4.3.9-3.29.i386.rpm php-mysql-4.3.9-3.29.i386.rpm php-ncurses-4.3.9-3.29.i386.rpm php-odbc-4.3.9-3.29.i386.rpm php-pear-4.3.9-3.29.i386.rpm php-pgsql-4.3.9-3.29.i386.rpm php-snmp-4.3.9-3.29.i386.rpm php-xmlrpc-4.3.9-3.29.i386.rpm x86_64: php-4.3.9-3.29.x86_64.rpm php-debuginfo-4.3.9-3.29.x86_64.rpm php-devel-4.3.9-3.29.x86_64.rpm php-domxml-4.3.9-3.29.x86_64.rpm php-gd-4.3.9-3.29.x86_64.rpm php-imap-4.3.9-3.29.x86_64.rpm php-ldap-4.3.9-3.29.x86_64.rpm php-mbstring-4.3.9-3.29.x86_64.rpm php-mysql-4.3.9-3.29.x86_64.rpm php-ncurses-4.3.9-3.29.x86_64.rpm php-odbc-4.3.9-3.29.x86_64.rpm php-pear-4.3.9-3.29.x86_64.rpm php-pgsql-4.3.9-3.29.x86_64.rpm php-snmp-4.3.9-3.29.x86_64.rpm php-xmlrpc-4.3.9-3.29.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/php-4.3.9-3.29.src.rpm i386: php-4.3.9-3.29.i386.rpm php-debuginfo-4.3.9-3.29.i386.rpm php-devel-4.3.9-3.29.i386.rpm php-domxml-4.3.9-3.29.i386.rpm php-gd-4.3.9-3.29.i386.rpm php-imap-4.3.9-3.29.i386.rpm php-ldap-4.3.9-3.29.i386.rpm php-mbstring-4.3.9-3.29.i386.rpm php-mysql-4.3.9-3.29.i386.rpm php-ncurses-4.3.9-3.29.i386.rpm php-odbc-4.3.9-3.29.i386.rpm php-pear-4.3.9-3.29.i386.rpm php-pgsql-4.3.9-3.29.i386.rpm php-snmp-4.3.9-3.29.i386.rpm php-xmlrpc-4.3.9-3.29.i386.rpm ia64: php-4.3.9-3.29.ia64.rpm php-debuginfo-4.3.9-3.29.ia64.rpm php-devel-4.3.9-3.29.ia64.rpm php-domxml-4.3.9-3.29.ia64.rpm php-gd-4.3.9-3.29.ia64.rpm php-imap-4.3.9-3.29.ia64.rpm php-ldap-4.3.9-3.29.ia64.rpm php-mbstring-4.3.9-3.29.ia64.rpm php-mysql-4.3.9-3.29.ia64.rpm php-ncurses-4.3.9-3.29.ia64.rpm php-odbc-4.3.9-3.29.ia64.rpm php-pear-4.3.9-3.29.ia64.rpm php-pgsql-4.3.9-3.29.ia64.rpm php-snmp-4.3.9-3.29.ia64.rpm php-xmlrpc-4.3.9-3.29.ia64.rpm x86_64: php-4.3.9-3.29.x86_64.rpm php-debuginfo-4.3.9-3.29.x86_64.rpm php-devel-4.3.9-3.29.x86_64.rpm php-domxml-4.3.9-3.29.x86_64.rpm php-gd-4.3.9-3.29.x86_64.rpm php-imap-4.3.9-3.29.x86_64.rpm php-ldap-4.3.9-3.29.x86_64.rpm php-mbstring-4.3.9-3.29.x86_64.rpm php-mysql-4.3.9-3.29.x86_64.rpm php-ncurses-4.3.9-3.29.x86_64.rpm php-odbc-4.3.9-3.29.x86_64.rpm php-pear-4.3.9-3.29.x86_64.rpm php-pgsql-4.3.9-3.29.x86_64.rpm php-snmp-4.3.9-3.29.x86_64.rpm php-xmlrpc-4.3.9-3.29.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/php-4.3.9-3.29.src.rpm i386: php-4.3.9-3.29.i386.rpm php-debuginfo-4.3.9-3.29.i386.rpm php-devel-4.3.9-3.29.i386.rpm php-domxml-4.3.9-3.29.i386.rpm php-gd-4.3.9-3.29.i386.rpm php-imap-4.3.9-3.29.i386.rpm php-ldap-4.3.9-3.29.i386.rpm php-mbstring-4.3.9-3.29.i386.rpm php-mysql-4.3.9-3.29.i386.rpm php-ncurses-4.3.9-3.29.i386.rpm php-odbc-4.3.9-3.29.i386.rpm php-pear-4.3.9-3.29.i386.rpm php-pgsql-4.3.9-3.29.i386.rpm php-snmp-4.3.9-3.29.i386.rpm php-xmlrpc-4.3.9-3.29.i386.rpm ia64: php-4.3.9-3.29.ia64.rpm php-debuginfo-4.3.9-3.29.ia64.rpm php-devel-4.3.9-3.29.ia64.rpm php-domxml-4.3.9-3.29.ia64.rpm php-gd-4.3.9-3.29.ia64.rpm php-imap-4.3.9-3.29.ia64.rpm php-ldap-4.3.9-3.29.ia64.rpm php-mbstring-4.3.9-3.29.ia64.rpm php-mysql-4.3.9-3.29.ia64.rpm php-ncurses-4.3.9-3.29.ia64.rpm php-odbc-4.3.9-3.29.ia64.rpm php-pear-4.3.9-3.29.ia64.rpm php-pgsql-4.3.9-3.29.ia64.rpm php-snmp-4.3.9-3.29.ia64.rpm php-xmlrpc-4.3.9-3.29.ia64.rpm x86_64: php-4.3.9-3.29.x86_64.rpm php-debuginfo-4.3.9-3.29.x86_64.rpm php-devel-4.3.9-3.29.x86_64.rpm php-domxml-4.3.9-3.29.x86_64.rpm php-gd-4.3.9-3.29.x86_64.rpm php-imap-4.3.9-3.29.x86_64.rpm php-ldap-4.3.9-3.29.x86_64.rpm php-mbstring-4.3.9-3.29.x86_64.rpm php-mysql-4.3.9-3.29.x86_64.rpm php-ncurses-4.3.9-3.29.x86_64.rpm php-odbc-4.3.9-3.29.x86_64.rpm php-pear-4.3.9-3.29.x86_64.rpm php-pgsql-4.3.9-3.29.x86_64.rpm php-snmp-4.3.9-3.29.x86_64.rpm php-xmlrpc-4.3.9-3.29.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/php-5.1.6-24.el5_4.5.src.rpm i386: php-5.1.6-24.el5_4.5.i386.rpm php-bcmath-5.1.6-24.el5_4.5.i386.rpm php-cli-5.1.6-24.el5_4.5.i386.rpm php-common-5.1.6-24.el5_4.5.i386.rpm php-dba-5.1.6-24.el5_4.5.i386.rpm php-debuginfo-5.1.6-24.el5_4.5.i386.rpm php-devel-5.1.6-24.el5_4.5.i386.rpm php-gd-5.1.6-24.el5_4.5.i386.rpm php-imap-5.1.6-24.el5_4.5.i386.rpm php-ldap-5.1.6-24.el5_4.5.i386.rpm php-mbstring-5.1.6-24.el5_4.5.i386.rpm php-mysql-5.1.6-24.el5_4.5.i386.rpm php-ncurses-5.1.6-24.el5_4.5.i386.rpm php-odbc-5.1.6-24.el5_4.5.i386.rpm php-pdo-5.1.6-24.el5_4.5.i386.rpm php-pgsql-5.1.6-24.el5_4.5.i386.rpm php-snmp-5.1.6-24.el5_4.5.i386.rpm php-soap-5.1.6-24.el5_4.5.i386.rpm php-xml-5.1.6-24.el5_4.5.i386.rpm php-xmlrpc-5.1.6-24.el5_4.5.i386.rpm x86_64: php-5.1.6-24.el5_4.5.x86_64.rpm php-bcmath-5.1.6-24.el5_4.5.x86_64.rpm php-cli-5.1.6-24.el5_4.5.x86_64.rpm php-common-5.1.6-24.el5_4.5.x86_64.rpm php-dba-5.1.6-24.el5_4.5.x86_64.rpm php-debuginfo-5.1.6-24.el5_4.5.x86_64.rpm php-devel-5.1.6-24.el5_4.5.x86_64.rpm php-gd-5.1.6-24.el5_4.5.x86_64.rpm php-imap-5.1.6-24.el5_4.5.x86_64.rpm php-ldap-5.1.6-24.el5_4.5.x86_64.rpm php-mbstring-5.1.6-24.el5_4.5.x86_64.rpm php-mysql-5.1.6-24.el5_4.5.x86_64.rpm php-ncurses-5.1.6-24.el5_4.5.x86_64.rpm php-odbc-5.1.6-24.el5_4.5.x86_64.rpm php-pdo-5.1.6-24.el5_4.5.x86_64.rpm php-pgsql-5.1.6-24.el5_4.5.x86_64.rpm php-snmp-5.1.6-24.el5_4.5.x86_64.rpm php-soap-5.1.6-24.el5_4.5.x86_64.rpm php-xml-5.1.6-24.el5_4.5.x86_64.rpm php-xmlrpc-5.1.6-24.el5_4.5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/php-5.1.6-24.el5_4.5.src.rpm i386: php-5.1.6-24.el5_4.5.i386.rpm php-bcmath-5.1.6-24.el5_4.5.i386.rpm php-cli-5.1.6-24.el5_4.5.i386.rpm php-common-5.1.6-24.el5_4.5.i386.rpm php-dba-5.1.6-24.el5_4.5.i386.rpm php-debuginfo-5.1.6-24.el5_4.5.i386.rpm php-devel-5.1.6-24.el5_4.5.i386.rpm php-gd-5.1.6-24.el5_4.5.i386.rpm php-imap-5.1.6-24.el5_4.5.i386.rpm php-ldap-5.1.6-24.el5_4.5.i386.rpm php-mbstring-5.1.6-24.el5_4.5.i386.rpm php-mysql-5.1.6-24.el5_4.5.i386.rpm php-ncurses-5.1.6-24.el5_4.5.i386.rpm php-odbc-5.1.6-24.el5_4.5.i386.rpm php-pdo-5.1.6-24.el5_4.5.i386.rpm php-pgsql-5.1.6-24.el5_4.5.i386.rpm php-snmp-5.1.6-24.el5_4.5.i386.rpm php-soap-5.1.6-24.el5_4.5.i386.rpm php-xml-5.1.6-24.el5_4.5.i386.rpm php-xmlrpc-5.1.6-24.el5_4.5.i386.rpm ia64: php-5.1.6-24.el5_4.5.ia64.rpm php-bcmath-5.1.6-24.el5_4.5.ia64.rpm php-cli-5.1.6-24.el5_4.5.ia64.rpm php-common-5.1.6-24.el5_4.5.ia64.rpm php-dba-5.1.6-24.el5_4.5.ia64.rpm php-debuginfo-5.1.6-24.el5_4.5.ia64.rpm php-devel-5.1.6-24.el5_4.5.ia64.rpm php-gd-5.1.6-24.el5_4.5.ia64.rpm php-imap-5.1.6-24.el5_4.5.ia64.rpm php-ldap-5.1.6-24.el5_4.5.ia64.rpm php-mbstring-5.1.6-24.el5_4.5.ia64.rpm php-mysql-5.1.6-24.el5_4.5.ia64.rpm php-ncurses-5.1.6-24.el5_4.5.ia64.rpm php-odbc-5.1.6-24.el5_4.5.ia64.rpm php-pdo-5.1.6-24.el5_4.5.ia64.rpm php-pgsql-5.1.6-24.el5_4.5.ia64.rpm php-snmp-5.1.6-24.el5_4.5.ia64.rpm php-soap-5.1.6-24.el5_4.5.ia64.rpm php-xml-5.1.6-24.el5_4.5.ia64.rpm php-xmlrpc-5.1.6-24.el5_4.5.ia64.rpm ppc: php-5.1.6-24.el5_4.5.ppc.rpm php-bcmath-5.1.6-24.el5_4.5.ppc.rpm php-cli-5.1.6-24.el5_4.5.ppc.rpm php-common-5.1.6-24.el5_4.5.ppc.rpm php-dba-5.1.6-24.el5_4.5.ppc.rpm php-debuginfo-5.1.6-24.el5_4.5.ppc.rpm php-devel-5.1.6-24.el5_4.5.ppc.rpm php-gd-5.1.6-24.el5_4.5.ppc.rpm php-imap-5.1.6-24.el5_4.5.ppc.rpm php-ldap-5.1.6-24.el5_4.5.ppc.rpm php-mbstring-5.1.6-24.el5_4.5.ppc.rpm php-mysql-5.1.6-24.el5_4.5.ppc.rpm php-ncurses-5.1.6-24.el5_4.5.ppc.rpm php-odbc-5.1.6-24.el5_4.5.ppc.rpm php-pdo-5.1.6-24.el5_4.5.ppc.rpm php-pgsql-5.1.6-24.el5_4.5.ppc.rpm php-snmp-5.1.6-24.el5_4.5.ppc.rpm php-soap-5.1.6-24.el5_4.5.ppc.rpm php-xml-5.1.6-24.el5_4.5.ppc.rpm php-xmlrpc-5.1.6-24.el5_4.5.ppc.rpm s390x: php-5.1.6-24.el5_4.5.s390x.rpm php-bcmath-5.1.6-24.el5_4.5.s390x.rpm php-cli-5.1.6-24.el5_4.5.s390x.rpm php-common-5.1.6-24.el5_4.5.s390x.rpm php-dba-5.1.6-24.el5_4.5.s390x.rpm php-debuginfo-5.1.6-24.el5_4.5.s390x.rpm php-devel-5.1.6-24.el5_4.5.s390x.rpm php-gd-5.1.6-24.el5_4.5.s390x.rpm php-imap-5.1.6-24.el5_4.5.s390x.rpm php-ldap-5.1.6-24.el5_4.5.s390x.rpm php-mbstring-5.1.6-24.el5_4.5.s390x.rpm php-mysql-5.1.6-24.el5_4.5.s390x.rpm php-ncurses-5.1.6-24.el5_4.5.s390x.rpm php-odbc-5.1.6-24.el5_4.5.s390x.rpm php-pdo-5.1.6-24.el5_4.5.s390x.rpm php-pgsql-5.1.6-24.el5_4.5.s390x.rpm php-snmp-5.1.6-24.el5_4.5.s390x.rpm php-soap-5.1.6-24.el5_4.5.s390x.rpm php-xml-5.1.6-24.el5_4.5.s390x.rpm php-xmlrpc-5.1.6-24.el5_4.5.s390x.rpm x86_64: php-5.1.6-24.el5_4.5.x86_64.rpm php-bcmath-5.1.6-24.el5_4.5.x86_64.rpm php-cli-5.1.6-24.el5_4.5.x86_64.rpm php-common-5.1.6-24.el5_4.5.x86_64.rpm php-dba-5.1.6-24.el5_4.5.x86_64.rpm php-debuginfo-5.1.6-24.el5_4.5.x86_64.rpm php-devel-5.1.6-24.el5_4.5.x86_64.rpm php-gd-5.1.6-24.el5_4.5.x86_64.rpm php-imap-5.1.6-24.el5_4.5.x86_64.rpm php-ldap-5.1.6-24.el5_4.5.x86_64.rpm php-mbstring-5.1.6-24.el5_4.5.x86_64.rpm php-mysql-5.1.6-24.el5_4.5.x86_64.rpm php-ncurses-5.1.6-24.el5_4.5.x86_64.rpm php-odbc-5.1.6-24.el5_4.5.x86_64.rpm php-pdo-5.1.6-24.el5_4.5.x86_64.rpm php-pgsql-5.1.6-24.el5_4.5.x86_64.rpm php-snmp-5.1.6-24.el5_4.5.x86_64.rpm php-soap-5.1.6-24.el5_4.5.x86_64.rpm php-xml-5.1.6-24.el5_4.5.x86_64.rpm php-xmlrpc-5.1.6-24.el5_4.5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-2687.html https://www.redhat.com/security/data/cve/CVE-2009-3291.html https://www.redhat.com/security/data/cve/CVE-2009-3292.html https://www.redhat.com/security/data/cve/CVE-2009-3546.html https://www.redhat.com/security/data/cve/CVE-2009-4017.html https://www.redhat.com/security/data/cve/CVE-2009-4142.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLTg2fXlSAg2UNWIIRAi8NAJ0c0HSIJKwHUyXQpsADmYVf8eFbjQCeOobl DLxyuWEk8AIU+xyZTvnRksU= =SALC -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 14 17:24:55 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 14 Jan 2010 12:24:55 -0500 Subject: [RHSA-2010:0044-01] Important: pidgin security update Message-ID: <201001141724.o0EHOtPd013591@int-mx05.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: pidgin security update Advisory ID: RHSA-2010:0044-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0044.html Issue date: 2010-01-14 CVE Names: CVE-2010-0013 ===================================================================== 1. Summary: Updated pidgin packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 RHEL Optional Productivity Applications (v. 5 server) - i386, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. A directory traversal flaw was discovered in Pidgin's MSN protocol implementation. A remote attacker could send a specially-crafted emoticon image download request that would cause Pidgin to disclose an arbitrary file readable to the user running Pidgin. (CVE-2010-0013) These packages upgrade Pidgin to version 2.6.5. Refer to the Pidgin release notes for a full list of changes: http://developer.pidgin.im/wiki/ChangeLog All Pidgin users should upgrade to these updated packages, which correct this issue. Pidgin must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 552483 - CVE-2010-0013 pidgin/libpurple: MSN custom smiley request directory traversal file disclosure 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/pidgin-2.6.5-1.el4.1.src.rpm i386: finch-2.6.5-1.el4.1.i386.rpm finch-devel-2.6.5-1.el4.1.i386.rpm libpurple-2.6.5-1.el4.1.i386.rpm libpurple-devel-2.6.5-1.el4.1.i386.rpm libpurple-perl-2.6.5-1.el4.1.i386.rpm libpurple-tcl-2.6.5-1.el4.1.i386.rpm pidgin-2.6.5-1.el4.1.i386.rpm pidgin-debuginfo-2.6.5-1.el4.1.i386.rpm pidgin-devel-2.6.5-1.el4.1.i386.rpm pidgin-perl-2.6.5-1.el4.1.i386.rpm ia64: finch-2.6.5-1.el4.1.ia64.rpm finch-devel-2.6.5-1.el4.1.ia64.rpm libpurple-2.6.5-1.el4.1.ia64.rpm libpurple-devel-2.6.5-1.el4.1.ia64.rpm libpurple-perl-2.6.5-1.el4.1.ia64.rpm libpurple-tcl-2.6.5-1.el4.1.ia64.rpm pidgin-2.6.5-1.el4.1.ia64.rpm pidgin-debuginfo-2.6.5-1.el4.1.ia64.rpm pidgin-devel-2.6.5-1.el4.1.ia64.rpm pidgin-perl-2.6.5-1.el4.1.ia64.rpm ppc: finch-2.6.5-1.el4.1.ppc.rpm finch-devel-2.6.5-1.el4.1.ppc.rpm libpurple-2.6.5-1.el4.1.ppc.rpm libpurple-devel-2.6.5-1.el4.1.ppc.rpm libpurple-perl-2.6.5-1.el4.1.ppc.rpm libpurple-tcl-2.6.5-1.el4.1.ppc.rpm pidgin-2.6.5-1.el4.1.ppc.rpm pidgin-debuginfo-2.6.5-1.el4.1.ppc.rpm pidgin-devel-2.6.5-1.el4.1.ppc.rpm pidgin-perl-2.6.5-1.el4.1.ppc.rpm x86_64: finch-2.6.5-1.el4.1.x86_64.rpm finch-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-2.6.5-1.el4.1.x86_64.rpm libpurple-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-perl-2.6.5-1.el4.1.x86_64.rpm libpurple-tcl-2.6.5-1.el4.1.x86_64.rpm pidgin-2.6.5-1.el4.1.x86_64.rpm pidgin-debuginfo-2.6.5-1.el4.1.x86_64.rpm pidgin-devel-2.6.5-1.el4.1.x86_64.rpm pidgin-perl-2.6.5-1.el4.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/pidgin-2.6.5-1.el4.1.src.rpm i386: finch-2.6.5-1.el4.1.i386.rpm finch-devel-2.6.5-1.el4.1.i386.rpm libpurple-2.6.5-1.el4.1.i386.rpm libpurple-devel-2.6.5-1.el4.1.i386.rpm libpurple-perl-2.6.5-1.el4.1.i386.rpm libpurple-tcl-2.6.5-1.el4.1.i386.rpm pidgin-2.6.5-1.el4.1.i386.rpm pidgin-debuginfo-2.6.5-1.el4.1.i386.rpm pidgin-devel-2.6.5-1.el4.1.i386.rpm pidgin-perl-2.6.5-1.el4.1.i386.rpm x86_64: finch-2.6.5-1.el4.1.x86_64.rpm finch-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-2.6.5-1.el4.1.x86_64.rpm libpurple-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-perl-2.6.5-1.el4.1.x86_64.rpm libpurple-tcl-2.6.5-1.el4.1.x86_64.rpm pidgin-2.6.5-1.el4.1.x86_64.rpm pidgin-debuginfo-2.6.5-1.el4.1.x86_64.rpm pidgin-devel-2.6.5-1.el4.1.x86_64.rpm pidgin-perl-2.6.5-1.el4.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/pidgin-2.6.5-1.el4.1.src.rpm i386: finch-2.6.5-1.el4.1.i386.rpm finch-devel-2.6.5-1.el4.1.i386.rpm libpurple-2.6.5-1.el4.1.i386.rpm libpurple-devel-2.6.5-1.el4.1.i386.rpm libpurple-perl-2.6.5-1.el4.1.i386.rpm libpurple-tcl-2.6.5-1.el4.1.i386.rpm pidgin-2.6.5-1.el4.1.i386.rpm pidgin-debuginfo-2.6.5-1.el4.1.i386.rpm pidgin-devel-2.6.5-1.el4.1.i386.rpm pidgin-perl-2.6.5-1.el4.1.i386.rpm ia64: finch-2.6.5-1.el4.1.ia64.rpm finch-devel-2.6.5-1.el4.1.ia64.rpm libpurple-2.6.5-1.el4.1.ia64.rpm libpurple-devel-2.6.5-1.el4.1.ia64.rpm libpurple-perl-2.6.5-1.el4.1.ia64.rpm libpurple-tcl-2.6.5-1.el4.1.ia64.rpm pidgin-2.6.5-1.el4.1.ia64.rpm pidgin-debuginfo-2.6.5-1.el4.1.ia64.rpm pidgin-devel-2.6.5-1.el4.1.ia64.rpm pidgin-perl-2.6.5-1.el4.1.ia64.rpm x86_64: finch-2.6.5-1.el4.1.x86_64.rpm finch-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-2.6.5-1.el4.1.x86_64.rpm libpurple-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-perl-2.6.5-1.el4.1.x86_64.rpm libpurple-tcl-2.6.5-1.el4.1.x86_64.rpm pidgin-2.6.5-1.el4.1.x86_64.rpm pidgin-debuginfo-2.6.5-1.el4.1.x86_64.rpm pidgin-devel-2.6.5-1.el4.1.x86_64.rpm pidgin-perl-2.6.5-1.el4.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/pidgin-2.6.5-1.el4.1.src.rpm i386: finch-2.6.5-1.el4.1.i386.rpm finch-devel-2.6.5-1.el4.1.i386.rpm libpurple-2.6.5-1.el4.1.i386.rpm libpurple-devel-2.6.5-1.el4.1.i386.rpm libpurple-perl-2.6.5-1.el4.1.i386.rpm libpurple-tcl-2.6.5-1.el4.1.i386.rpm pidgin-2.6.5-1.el4.1.i386.rpm pidgin-debuginfo-2.6.5-1.el4.1.i386.rpm pidgin-devel-2.6.5-1.el4.1.i386.rpm pidgin-perl-2.6.5-1.el4.1.i386.rpm ia64: finch-2.6.5-1.el4.1.ia64.rpm finch-devel-2.6.5-1.el4.1.ia64.rpm libpurple-2.6.5-1.el4.1.ia64.rpm libpurple-devel-2.6.5-1.el4.1.ia64.rpm libpurple-perl-2.6.5-1.el4.1.ia64.rpm libpurple-tcl-2.6.5-1.el4.1.ia64.rpm pidgin-2.6.5-1.el4.1.ia64.rpm pidgin-debuginfo-2.6.5-1.el4.1.ia64.rpm pidgin-devel-2.6.5-1.el4.1.ia64.rpm pidgin-perl-2.6.5-1.el4.1.ia64.rpm x86_64: finch-2.6.5-1.el4.1.x86_64.rpm finch-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-2.6.5-1.el4.1.x86_64.rpm libpurple-devel-2.6.5-1.el4.1.x86_64.rpm libpurple-perl-2.6.5-1.el4.1.x86_64.rpm libpurple-tcl-2.6.5-1.el4.1.x86_64.rpm pidgin-2.6.5-1.el4.1.x86_64.rpm pidgin-debuginfo-2.6.5-1.el4.1.x86_64.rpm pidgin-devel-2.6.5-1.el4.1.x86_64.rpm pidgin-perl-2.6.5-1.el4.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.6.5-1.el5.src.rpm i386: finch-2.6.5-1.el5.i386.rpm libpurple-2.6.5-1.el5.i386.rpm libpurple-perl-2.6.5-1.el5.i386.rpm libpurple-tcl-2.6.5-1.el5.i386.rpm pidgin-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-perl-2.6.5-1.el5.i386.rpm x86_64: finch-2.6.5-1.el5.i386.rpm finch-2.6.5-1.el5.x86_64.rpm libpurple-2.6.5-1.el5.i386.rpm libpurple-2.6.5-1.el5.x86_64.rpm libpurple-perl-2.6.5-1.el5.x86_64.rpm libpurple-tcl-2.6.5-1.el5.x86_64.rpm pidgin-2.6.5-1.el5.i386.rpm pidgin-2.6.5-1.el5.x86_64.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.x86_64.rpm pidgin-perl-2.6.5-1.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pidgin-2.6.5-1.el5.src.rpm i386: finch-devel-2.6.5-1.el5.i386.rpm libpurple-devel-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-devel-2.6.5-1.el5.i386.rpm x86_64: finch-devel-2.6.5-1.el5.i386.rpm finch-devel-2.6.5-1.el5.x86_64.rpm libpurple-devel-2.6.5-1.el5.i386.rpm libpurple-devel-2.6.5-1.el5.x86_64.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.x86_64.rpm pidgin-devel-2.6.5-1.el5.i386.rpm pidgin-devel-2.6.5-1.el5.x86_64.rpm RHEL Optional Productivity Applications (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/pidgin-2.6.5-1.el5.src.rpm i386: finch-2.6.5-1.el5.i386.rpm finch-devel-2.6.5-1.el5.i386.rpm libpurple-2.6.5-1.el5.i386.rpm libpurple-devel-2.6.5-1.el5.i386.rpm libpurple-perl-2.6.5-1.el5.i386.rpm libpurple-tcl-2.6.5-1.el5.i386.rpm pidgin-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-devel-2.6.5-1.el5.i386.rpm pidgin-perl-2.6.5-1.el5.i386.rpm x86_64: finch-2.6.5-1.el5.i386.rpm finch-2.6.5-1.el5.x86_64.rpm finch-devel-2.6.5-1.el5.i386.rpm finch-devel-2.6.5-1.el5.x86_64.rpm libpurple-2.6.5-1.el5.i386.rpm libpurple-2.6.5-1.el5.x86_64.rpm libpurple-devel-2.6.5-1.el5.i386.rpm libpurple-devel-2.6.5-1.el5.x86_64.rpm libpurple-perl-2.6.5-1.el5.x86_64.rpm libpurple-tcl-2.6.5-1.el5.x86_64.rpm pidgin-2.6.5-1.el5.i386.rpm pidgin-2.6.5-1.el5.x86_64.rpm pidgin-debuginfo-2.6.5-1.el5.i386.rpm pidgin-debuginfo-2.6.5-1.el5.x86_64.rpm pidgin-devel-2.6.5-1.el5.i386.rpm pidgin-devel-2.6.5-1.el5.x86_64.rpm pidgin-perl-2.6.5-1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-0013.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLT1NaXlSAg2UNWIIRAvGmAJ9Hdl9FXgst52fNHs5pvCkC3ABXsACeIQ7C tyDh5okp3U/DCTXBYjA3juM= =LpY0 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Jan 19 23:41:18 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Jan 2010 18:41:18 -0500 Subject: [RHSA-2010:0046-01] Important: kernel security and bug fix update Message-ID: <201001192341.o0JNfIbT015087@int-mx05.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2010:0046-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0046.html Issue date: 2010-01-19 CVE Names: CVE-2006-6304 CVE-2009-2910 CVE-2009-3080 CVE-2009-3556 CVE-2009-3889 CVE-2009-3939 CVE-2009-4020 CVE-2009-4021 CVE-2009-4138 CVE-2009-4141 CVE-2009-4272 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: * an array index error was found in the gdth driver. A local user could send a specially-crafted IOCTL request that would cause a denial of service or, possibly, privilege escalation. (CVE-2009-3080, Important) * a flaw was found in the FUSE implementation. When a system is low on memory, fuse_put_request() could dereference an invalid pointer, possibly leading to a local denial of service or privilege escalation. (CVE-2009-4021, Important) * Tavis Ormandy discovered a deficiency in the fasync_helper() implementation. This could allow a local, unprivileged user to leverage a use-after-free of locked, asynchronous file descriptors to cause a denial of service or privilege escalation. (CVE-2009-4141, Important) * the Parallels Virtuozzo Containers team reported the RHSA-2009:1243 update introduced two flaws in the routing implementation. If an attacker was able to cause a large enough number of collisions in the routing hash table (via specially-crafted packets) for the emergency route flush to trigger, a deadlock could occur. Secondly, if the kernel routing cache was disabled, an uninitialized pointer would be left behind after a route lookup, leading to a kernel panic. (CVE-2009-4272, Important) * the RHSA-2009:0225 update introduced a rewrite attack flaw in the do_coredump() function. A local attacker able to guess the file name a process is going to dump its core to, prior to the process crashing, could use this flaw to append data to the dumped core file. This issue only affects systems that have "/proc/sys/fs/suid_dumpable" set to 2 (the default value is 0). (CVE-2006-6304, Moderate) The fix for CVE-2006-6304 changes the expected behavior: With suid_dumpable set to 2, the core file will not be recorded if the file already exists. For example, core files will not be overwritten on subsequent crashes of processes whose core files map to the same name. * an information leak was found in the Linux kernel. On AMD64 systems, 32-bit processes could access and read certain 64-bit registers by temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate) * the RHBA-2008:0314 update introduced N_Port ID Virtualization (NPIV) support in the qla2xxx driver, resulting in two new sysfs pseudo files, "/sys/class/scsi_host/[a qla2xxx host]/vport_create" and "vport_delete". These two files were world-writable by default, allowing a local user to change SCSI host attributes. This flaw only affects systems using the qla2xxx driver and NPIV capable hardware. (CVE-2009-3556, Moderate) * permission issues were found in the megaraid_sas driver. The "dbg_lvl" and "poll_mode_io" files on the sysfs file system ("/sys/") had world-writable permissions. This could allow local, unprivileged users to change the behavior of the driver. (CVE-2009-3889, CVE-2009-3939, Moderate) * a NULL pointer dereference flaw was found in the firewire-ohci driver used for OHCI compliant IEEE 1394 controllers. A local, unprivileged user with access to /dev/fw* files could issue certain IOCTL calls, causing a denial of service or privilege escalation. The FireWire modules are blacklisted by default, and if enabled, only root has access to the files noted above by default. (CVE-2009-4138, Moderate) * a buffer overflow flaw was found in the hfs_bnode_read() function in the HFS file system implementation. This could lead to a denial of service if a user browsed a specially-crafted HFS file system, for example, by running "ls". (CVE-2009-4020, Low) Bug fix documentation for this update will be available shortly from www.redhat.com/docs/en-US/errata/RHSA-2010-0046/Kernel_Security_Update/ index.html Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 526068 - CVE-2009-3889 CVE-2009-3939 kernel: megaraid_sas permissions in sysfs 526788 - CVE-2009-2910 kernel: x86_64 32 bit process register leak 537027 - Timedrift on VM with pv_clock enabled, causing system hangs and sporadic time behaviour [rhel-5.4.z] 537177 - CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable 537273 - CVE-2006-6304 kernel: use flag in do_coredump() 538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer 539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl 539686 - bnx2: panic in bnx2_poll_work() [rhel-5.4.z] 540736 - CVE-2009-4020 kernel: hfs buffer overflow 540896 - PV clock fix throws off database application time [rhel-5.4.z] 542582 - kdump corefile cannot be backtraced in IA64 [rhel-5.4.z] 543448 - Using IPoIB, losing connectivity with 1 host, other hosts accessible [rhel-5.4.z] 544978 - glock_workqueue -- glock ref count via gfs2_glock_hold [rhel-5.4.z] 545411 - CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock 547236 - CVE-2009-4138 kernel: firewire: ohci: handle receive packets with a data length of zero 547521 - CRM#1971672, Data loss in GFS2 when multiple nodes writes to same file [rhel-5.4.z] 547530 - kernel: BUG: soft lockup - CPU#1 stuck for 13s! [httpd:4490] [rhel-5.4.z] 547906 - CVE-2009-4141 kernel: create_elf_tables can leave urandom in a bad state 548370 - kernel: sleeping vfs_check_frozen in called in atomic context from do_wp_page [rhel-5.4.z] 549905 - hvm, x86_64 guest panic on 2.6.18-164.9.1.el5 [rhel-5.4.z] 549906 - [NetApp 5.4.z bug] Emulex FC ports on RHEL 5.4 GA offlined during target controller faults [rhel-5.4.z] 549907 - Hang when echoing to /proc/sys/net/ipv4/route/secret_interval [rhel-5.4.z] 549908 - resize2fs online resize hangs [rhel-5.4.z] 550968 - RHEL5.4 guest with PV clock: inconsistent times returned by clock_gettime(CLOCK_REALTIME) and gettimeofday() [rhel-5.4.z] 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kernel-2.6.18-164.11.1.el5.src.rpm i386: kernel-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm kernel-debug-2.6.18-164.11.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm kernel-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.i686.rpm kernel-devel-2.6.18-164.11.1.el5.i686.rpm kernel-headers-2.6.18-164.11.1.el5.i386.rpm kernel-xen-2.6.18-164.11.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm noarch: kernel-doc-2.6.18-164.11.1.el5.noarch.rpm x86_64: kernel-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.x86_64.rpm kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kernel-2.6.18-164.11.1.el5.src.rpm i386: kernel-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-PAE-devel-2.6.18-164.11.1.el5.i686.rpm kernel-debug-2.6.18-164.11.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-debug-devel-2.6.18-164.11.1.el5.i686.rpm kernel-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.i686.rpm kernel-devel-2.6.18-164.11.1.el5.i686.rpm kernel-headers-2.6.18-164.11.1.el5.i386.rpm kernel-xen-2.6.18-164.11.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-164.11.1.el5.i686.rpm kernel-xen-devel-2.6.18-164.11.1.el5.i686.rpm ia64: kernel-2.6.18-164.11.1.el5.ia64.rpm kernel-debug-2.6.18-164.11.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.ia64.rpm kernel-debug-devel-2.6.18-164.11.1.el5.ia64.rpm kernel-debuginfo-2.6.18-164.11.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.ia64.rpm kernel-devel-2.6.18-164.11.1.el5.ia64.rpm kernel-headers-2.6.18-164.11.1.el5.ia64.rpm kernel-xen-2.6.18-164.11.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-164.11.1.el5.ia64.rpm kernel-xen-devel-2.6.18-164.11.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-164.11.1.el5.noarch.rpm ppc: kernel-2.6.18-164.11.1.el5.ppc64.rpm kernel-debug-2.6.18-164.11.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-164.11.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.ppc64.rpm kernel-devel-2.6.18-164.11.1.el5.ppc64.rpm kernel-headers-2.6.18-164.11.1.el5.ppc.rpm kernel-headers-2.6.18-164.11.1.el5.ppc64.rpm kernel-kdump-2.6.18-164.11.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-164.11.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-164.11.1.el5.ppc64.rpm s390x: kernel-2.6.18-164.11.1.el5.s390x.rpm kernel-debug-2.6.18-164.11.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.s390x.rpm kernel-debug-devel-2.6.18-164.11.1.el5.s390x.rpm kernel-debuginfo-2.6.18-164.11.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.s390x.rpm kernel-devel-2.6.18-164.11.1.el5.s390x.rpm kernel-headers-2.6.18-164.11.1.el5.s390x.rpm kernel-kdump-2.6.18-164.11.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-164.11.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-164.11.1.el5.s390x.rpm x86_64: kernel-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-164.11.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-164.11.1.el5.x86_64.rpm kernel-devel-2.6.18-164.11.1.el5.x86_64.rpm kernel-headers-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-164.11.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-164.11.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2006-6304.html https://www.redhat.com/security/data/cve/CVE-2009-2910.html https://www.redhat.com/security/data/cve/CVE-2009-3080.html https://www.redhat.com/security/data/cve/CVE-2009-3556.html https://www.redhat.com/security/data/cve/CVE-2009-3889.html https://www.redhat.com/security/data/cve/CVE-2009-3939.html https://www.redhat.com/security/data/cve/CVE-2009-4020.html https://www.redhat.com/security/data/cve/CVE-2009-4021.html https://www.redhat.com/security/data/cve/CVE-2009-4138.html https://www.redhat.com/security/data/cve/CVE-2009-4141.html https://www.redhat.com/security/data/cve/CVE-2009-4272.html http://www.redhat.com/security/updates/classification/#important http://kbase.redhat.com/faq/docs/DOC-20536 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVkMOXlSAg2UNWIIRAv9fAJ4srKWUnIYD49CS8bSbxafK8Jpk1gCeNk+y KdAhEJk1P2KotTF5p4bw7ys= =j+JL -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 20 00:16:17 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Jan 2010 19:16:17 -0500 Subject: [RHSA-2010:0053-01] Important: kernel security and bug fix update Message-ID: <201001200016.o0K0GHRn027716@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2010:0053-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0053.html Issue date: 2010-01-19 CVE Names: CVE-2007-4567 CVE-2009-4536 CVE-2009-4537 CVE-2009-4538 ===================================================================== 1. Summary: Updated kernel packages that fix multiple security issues and two bugs are now available for Red Hat Enterprise Linux 5.3 Extended Update Support. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5.3.z server) - i386, ia64, noarch, ppc, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * a flaw was found in the IPv6 Extension Header (EH) handling implementation in the Linux kernel. The skb->dst data structure was not properly validated in the ipv6_hop_jumbo() function. This could possibly lead to a remote denial of service. (CVE-2007-4567, Important) * a flaw was found in each of the following Intel PRO/1000 Linux drivers in the Linux kernel: e1000 and e1000e. A remote attacker using packets larger than the MTU could bypass the existing fragment check, resulting in partial, invalid frames being passed to the network stack. These flaws could also possibly be used to trigger a remote denial of service. (CVE-2009-4536, CVE-2009-4538, Important) * a flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel. Receiving overly-long frames with a certain revision of the network cards supported by this driver could possibly result in a remote denial of service. (CVE-2009-4537, Important) This update also fixes the following bugs: * on certain hardware, the igb driver was unable to detect link statuses correctly for Serializer-Deserializer (SERDES) interface Ethernet ports. This may have caused problems for network interface bonding, such as failover not occurring. (BZ#548023) * in certain situations, kdump occasionally dumped a vmcore file with no registers on Intel Itanium systems that were under high disk I/O load. In these cases, this prevented the kernel stack backtrace in the vmcore from being viewed with the crash utility. (BZ#542581) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 542581 - kdump corefile cannot be backtraced in IA64 [rhel-5.3.z] 548023 - EL5.3: igb driver fails to detect link status change on SERDES interface [rhel-5.3.z] 548641 - CVE-2007-4567 kernel: ipv6_hop_jumbo remote system crash 550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3 551214 - CVE-2009-4538 kernel: e1000e frame fragment issue 552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3 6. Package List: Red Hat Enterprise Linux (v. 5.3.z server): Source: kernel-2.6.18-128.12.1.el5.src.rpm i386: kernel-2.6.18-128.12.1.el5.i686.rpm kernel-PAE-2.6.18-128.12.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-128.12.1.el5.i686.rpm kernel-PAE-devel-2.6.18-128.12.1.el5.i686.rpm kernel-debug-2.6.18-128.12.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-128.12.1.el5.i686.rpm kernel-debug-devel-2.6.18-128.12.1.el5.i686.rpm kernel-debuginfo-2.6.18-128.12.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-128.12.1.el5.i686.rpm kernel-devel-2.6.18-128.12.1.el5.i686.rpm kernel-headers-2.6.18-128.12.1.el5.i386.rpm kernel-xen-2.6.18-128.12.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-128.12.1.el5.i686.rpm kernel-xen-devel-2.6.18-128.12.1.el5.i686.rpm ia64: kernel-2.6.18-128.12.1.el5.ia64.rpm kernel-debug-2.6.18-128.12.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-128.12.1.el5.ia64.rpm kernel-debug-devel-2.6.18-128.12.1.el5.ia64.rpm kernel-debuginfo-2.6.18-128.12.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-128.12.1.el5.ia64.rpm kernel-devel-2.6.18-128.12.1.el5.ia64.rpm kernel-headers-2.6.18-128.12.1.el5.ia64.rpm kernel-xen-2.6.18-128.12.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-128.12.1.el5.ia64.rpm kernel-xen-devel-2.6.18-128.12.1.el5.ia64.rpm noarch: kernel-doc-2.6.18-128.12.1.el5.noarch.rpm ppc: kernel-2.6.18-128.12.1.el5.ppc64.rpm kernel-debug-2.6.18-128.12.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-128.12.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-128.12.1.el5.ppc64.rpm kernel-devel-2.6.18-128.12.1.el5.ppc64.rpm kernel-headers-2.6.18-128.12.1.el5.ppc.rpm kernel-headers-2.6.18-128.12.1.el5.ppc64.rpm kernel-kdump-2.6.18-128.12.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-128.12.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-128.12.1.el5.ppc64.rpm s390x: kernel-2.6.18-128.12.1.el5.s390x.rpm kernel-debug-2.6.18-128.12.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-128.12.1.el5.s390x.rpm kernel-debug-devel-2.6.18-128.12.1.el5.s390x.rpm kernel-debuginfo-2.6.18-128.12.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-128.12.1.el5.s390x.rpm kernel-devel-2.6.18-128.12.1.el5.s390x.rpm kernel-headers-2.6.18-128.12.1.el5.s390x.rpm kernel-kdump-2.6.18-128.12.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-128.12.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-128.12.1.el5.s390x.rpm x86_64: kernel-2.6.18-128.12.1.el5.x86_64.rpm kernel-debug-2.6.18-128.12.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-128.12.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-128.12.1.el5.x86_64.rpm kernel-devel-2.6.18-128.12.1.el5.x86_64.rpm kernel-headers-2.6.18-128.12.1.el5.x86_64.rpm kernel-xen-2.6.18-128.12.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-128.12.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-128.12.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2007-4567.html https://www.redhat.com/security/data/cve/CVE-2009-4536.html https://www.redhat.com/security/data/cve/CVE-2009-4537.html https://www.redhat.com/security/data/cve/CVE-2009-4538.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVktGXlSAg2UNWIIRArSKAKCTtzyMIPJBUYR8IiLkgvDoOBv+VACfZ6dp 5Epmo8QFKo60Vw0BVVdhqMg= =V7Hl -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 20 00:25:03 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 19 Jan 2010 19:25:03 -0500 Subject: [RHSA-2010:0054-01] Moderate: openssl security update Message-ID: <201001200025.o0K0P3N0007596@int-mx04.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2010:0054-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0054.html Issue date: 2010-01-19 CVE Names: CVE-2009-2409 CVE-2009-4355 ===================================================================== 1. Summary: Updated openssl packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as a full-strength, general purpose cryptography library. It was found that the OpenSSL library did not properly re-initialize its internal state in the SSL_library_init() function after previous calls to the CRYPTO_cleanup_all_ex_data() function, which would cause a memory leak for each subsequent SSL connection. This flaw could cause server applications that call those functions during reload, such as a combination of the Apache HTTP Server, mod_ssl, PHP, and cURL, to consume all available memory, resulting in a denial of service. (CVE-2009-4355) Dan Kaminsky found that browsers could accept certificates with MD2 hash signatures, even though MD2 is no longer considered a cryptographically strong algorithm. This could make it easier for an attacker to create a malicious certificate that would be treated as trusted by a browser. OpenSSL now disables the use of the MD2 algorithm inside signatures by default. (CVE-2009-2409) All OpenSSL users should upgrade to these updated packages, which contain backported patches to resolve these issues. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 510197 - CVE-2009-2409 deprecate MD2 in SSL cert validation (Kaminsky) 546707 - CVE-2009-4355 openssl significant memory leak in certain SSLv3 requests (DoS) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8e-12.el5_4.1.src.rpm i386: openssl-0.9.8e-12.el5_4.1.i386.rpm openssl-0.9.8e-12.el5_4.1.i686.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i386.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i686.rpm openssl-perl-0.9.8e-12.el5_4.1.i386.rpm x86_64: openssl-0.9.8e-12.el5_4.1.i686.rpm openssl-0.9.8e-12.el5_4.1.x86_64.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i686.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.x86_64.rpm openssl-perl-0.9.8e-12.el5_4.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/openssl-0.9.8e-12.el5_4.1.src.rpm i386: openssl-debuginfo-0.9.8e-12.el5_4.1.i386.rpm openssl-devel-0.9.8e-12.el5_4.1.i386.rpm x86_64: openssl-debuginfo-0.9.8e-12.el5_4.1.i386.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.x86_64.rpm openssl-devel-0.9.8e-12.el5_4.1.i386.rpm openssl-devel-0.9.8e-12.el5_4.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/openssl-0.9.8e-12.el5_4.1.src.rpm i386: openssl-0.9.8e-12.el5_4.1.i386.rpm openssl-0.9.8e-12.el5_4.1.i686.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i386.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i686.rpm openssl-devel-0.9.8e-12.el5_4.1.i386.rpm openssl-perl-0.9.8e-12.el5_4.1.i386.rpm ia64: openssl-0.9.8e-12.el5_4.1.i686.rpm openssl-0.9.8e-12.el5_4.1.ia64.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i686.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.ia64.rpm openssl-devel-0.9.8e-12.el5_4.1.ia64.rpm openssl-perl-0.9.8e-12.el5_4.1.ia64.rpm ppc: openssl-0.9.8e-12.el5_4.1.ppc.rpm openssl-0.9.8e-12.el5_4.1.ppc64.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.ppc.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.ppc64.rpm openssl-devel-0.9.8e-12.el5_4.1.ppc.rpm openssl-devel-0.9.8e-12.el5_4.1.ppc64.rpm openssl-perl-0.9.8e-12.el5_4.1.ppc.rpm s390x: openssl-0.9.8e-12.el5_4.1.s390.rpm openssl-0.9.8e-12.el5_4.1.s390x.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.s390.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.s390x.rpm openssl-devel-0.9.8e-12.el5_4.1.s390.rpm openssl-devel-0.9.8e-12.el5_4.1.s390x.rpm openssl-perl-0.9.8e-12.el5_4.1.s390x.rpm x86_64: openssl-0.9.8e-12.el5_4.1.i686.rpm openssl-0.9.8e-12.el5_4.1.x86_64.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i386.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.i686.rpm openssl-debuginfo-0.9.8e-12.el5_4.1.x86_64.rpm openssl-devel-0.9.8e-12.el5_4.1.i386.rpm openssl-devel-0.9.8e-12.el5_4.1.x86_64.rpm openssl-perl-0.9.8e-12.el5_4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-2409.html https://www.redhat.com/security/data/cve/CVE-2009-4355.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVk1RXlSAg2UNWIIRAjJMAJ9g5P3w6KtQOXf25XUcd8WMcG+2gQCgpSOc Dm+xt2ADLQrYB9Fs1j89aAk= =EXs7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 20 15:20:36 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 20 Jan 2010 10:20:36 -0500 Subject: [RHSA-2010:0060-01] Critical: acroread security update Message-ID: <201001201520.o0KFKafT005004@int-mx04.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: acroread security update Advisory ID: RHSA-2010:0060-01 Product: Red Hat Enterprise Linux Extras Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0060.html Issue date: 2010-01-20 CVE Names: CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3956 CVE-2009-3959 CVE-2009-4324 ===================================================================== 1. Summary: The acroread packages as shipped in Red Hat Enterprise Linux 3 Extras contain security flaws and should not be used. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Desktop version 3 Extras - i386 Red Hat Enterprise Linux AS version 3 Extras - i386 Red Hat Enterprise Linux ES version 3 Extras - i386 Red Hat Enterprise Linux WS version 3 Extras - i386 3. Description: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). Adobe Reader 8.1.7 is vulnerable to critical security flaws and should no longer be used. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2009-4324, CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3959, CVE-2009-3956) Adobe have discontinued support for Adobe Reader 8 for Linux. Adobe Reader 9 for Linux is not compatible with Red Hat Enterprise Linux 3. An alternative PDF file viewer available in Red Hat Enterprise Linux 3 is xpdf. This update removes the acroread packages due to their known security vulnerabilities. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 547799 - CVE-2009-4324 acroread: media.newplayer JavaScript API code execution vulnerability (APSB10-02) 554293 - CVE-2009-3953 CVE-2009-3954 CVE-2009-3955 CVE-2009-3959 acroread: multiple code execution flaws (APSB10-02) 554296 - CVE-2009-3956 acroread: script injection vulnerability (APSB10-02) 6. Package List: Red Hat Enterprise Linux AS version 3 Extras: i386: acroread-uninstall-9.3-3.i386.rpm Red Hat Desktop version 3 Extras: i386: acroread-uninstall-9.3-3.i386.rpm Red Hat Enterprise Linux ES version 3 Extras: i386: acroread-uninstall-9.3-3.i386.rpm Red Hat Enterprise Linux WS version 3 Extras: i386: acroread-uninstall-9.3-3.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3953.html https://www.redhat.com/security/data/cve/CVE-2009-3954.html https://www.redhat.com/security/data/cve/CVE-2009-3955.html https://www.redhat.com/security/data/cve/CVE-2009-3956.html https://www.redhat.com/security/data/cve/CVE-2009-3959.html https://www.redhat.com/security/data/cve/CVE-2009-4324.html http://www.redhat.com/security/updates/classification/#critical http://www.adobe.com/support/security/bulletins/apsb10-02.html 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVx8UXlSAg2UNWIIRAvXbAJ4jHpoOnMYcI1yFuGBL+egx1kH3cwCfQtCe OKKnLAaflNtFWlJvrdu/3mA= =M896 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 20 15:21:34 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 20 Jan 2010 10:21:34 -0500 Subject: [RHSA-2010:0061-02] Moderate: gzip security update Message-ID: <201001201521.o0KFLYS1021785@int-mx05.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: gzip security update Advisory ID: RHSA-2010:0061-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0061.html Issue date: 2010-01-20 CVE Names: CVE-2010-0001 ===================================================================== 1. Summary: An updated gzip package that fixes one security issue is now available for Red Hat Enterprise Linux 3, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: The gzip package provides the GNU gzip data compression program. An integer underflow flaw, leading to an array index error, was found in the way gzip expanded archive files compressed with the Lempel-Ziv-Welch (LZW) compression algorithm. If a victim expanded a specially-crafted archive, it could cause gzip to crash or, potentially, execute arbitrary code with the privileges of the user running gzip. This flaw only affects 64-bit systems. (CVE-2010-0001) Red Hat would like to thank Aki Helin of the Oulu University Secure Programming Group for responsibly reporting this flaw. Users of gzip should upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 554418 - CVE-2010-0001 gzip: (64 bit) Integer underflow by decompressing LZW format files 6. Package List: Red Hat Enterprise Linux AS version 3: Source: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/gzip-1.3.3-15.rhel3.src.rpm i386: gzip-1.3.3-15.rhel3.i386.rpm gzip-debuginfo-1.3.3-15.rhel3.i386.rpm ia64: gzip-1.3.3-15.rhel3.ia64.rpm gzip-debuginfo-1.3.3-15.rhel3.ia64.rpm ppc: gzip-1.3.3-15.rhel3.ppc.rpm gzip-debuginfo-1.3.3-15.rhel3.ppc.rpm s390: gzip-1.3.3-15.rhel3.s390.rpm gzip-debuginfo-1.3.3-15.rhel3.s390.rpm s390x: gzip-1.3.3-15.rhel3.s390x.rpm gzip-debuginfo-1.3.3-15.rhel3.s390x.rpm x86_64: gzip-1.3.3-15.rhel3.x86_64.rpm gzip-debuginfo-1.3.3-15.rhel3.x86_64.rpm Red Hat Desktop version 3: Source: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/gzip-1.3.3-15.rhel3.src.rpm i386: gzip-1.3.3-15.rhel3.i386.rpm gzip-debuginfo-1.3.3-15.rhel3.i386.rpm x86_64: gzip-1.3.3-15.rhel3.x86_64.rpm gzip-debuginfo-1.3.3-15.rhel3.x86_64.rpm Red Hat Enterprise Linux ES version 3: Source: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/gzip-1.3.3-15.rhel3.src.rpm i386: gzip-1.3.3-15.rhel3.i386.rpm gzip-debuginfo-1.3.3-15.rhel3.i386.rpm ia64: gzip-1.3.3-15.rhel3.ia64.rpm gzip-debuginfo-1.3.3-15.rhel3.ia64.rpm x86_64: gzip-1.3.3-15.rhel3.x86_64.rpm gzip-debuginfo-1.3.3-15.rhel3.x86_64.rpm Red Hat Enterprise Linux WS version 3: Source: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/gzip-1.3.3-15.rhel3.src.rpm i386: gzip-1.3.3-15.rhel3.i386.rpm gzip-debuginfo-1.3.3-15.rhel3.i386.rpm ia64: gzip-1.3.3-15.rhel3.ia64.rpm gzip-debuginfo-1.3.3-15.rhel3.ia64.rpm x86_64: gzip-1.3.3-15.rhel3.x86_64.rpm gzip-debuginfo-1.3.3-15.rhel3.x86_64.rpm Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gzip-1.3.3-18.el4_8.1.src.rpm i386: gzip-1.3.3-18.el4_8.1.i386.rpm gzip-debuginfo-1.3.3-18.el4_8.1.i386.rpm ia64: gzip-1.3.3-18.el4_8.1.ia64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.ia64.rpm ppc: gzip-1.3.3-18.el4_8.1.ppc.rpm gzip-debuginfo-1.3.3-18.el4_8.1.ppc.rpm s390: gzip-1.3.3-18.el4_8.1.s390.rpm gzip-debuginfo-1.3.3-18.el4_8.1.s390.rpm s390x: gzip-1.3.3-18.el4_8.1.s390x.rpm gzip-debuginfo-1.3.3-18.el4_8.1.s390x.rpm x86_64: gzip-1.3.3-18.el4_8.1.x86_64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gzip-1.3.3-18.el4_8.1.src.rpm i386: gzip-1.3.3-18.el4_8.1.i386.rpm gzip-debuginfo-1.3.3-18.el4_8.1.i386.rpm x86_64: gzip-1.3.3-18.el4_8.1.x86_64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gzip-1.3.3-18.el4_8.1.src.rpm i386: gzip-1.3.3-18.el4_8.1.i386.rpm gzip-debuginfo-1.3.3-18.el4_8.1.i386.rpm ia64: gzip-1.3.3-18.el4_8.1.ia64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.ia64.rpm x86_64: gzip-1.3.3-18.el4_8.1.x86_64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gzip-1.3.3-18.el4_8.1.src.rpm i386: gzip-1.3.3-18.el4_8.1.i386.rpm gzip-debuginfo-1.3.3-18.el4_8.1.i386.rpm ia64: gzip-1.3.3-18.el4_8.1.ia64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.ia64.rpm x86_64: gzip-1.3.3-18.el4_8.1.x86_64.rpm gzip-debuginfo-1.3.3-18.el4_8.1.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gzip-1.3.5-11.el5_4.1.src.rpm i386: gzip-1.3.5-11.el5_4.1.i386.rpm gzip-debuginfo-1.3.5-11.el5_4.1.i386.rpm x86_64: gzip-1.3.5-11.el5_4.1.x86_64.rpm gzip-debuginfo-1.3.5-11.el5_4.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gzip-1.3.5-11.el5_4.1.src.rpm i386: gzip-1.3.5-11.el5_4.1.i386.rpm gzip-debuginfo-1.3.5-11.el5_4.1.i386.rpm ia64: gzip-1.3.5-11.el5_4.1.ia64.rpm gzip-debuginfo-1.3.5-11.el5_4.1.ia64.rpm ppc: gzip-1.3.5-11.el5_4.1.ppc.rpm gzip-debuginfo-1.3.5-11.el5_4.1.ppc.rpm s390x: gzip-1.3.5-11.el5_4.1.s390x.rpm gzip-debuginfo-1.3.5-11.el5_4.1.s390x.rpm x86_64: gzip-1.3.5-11.el5_4.1.x86_64.rpm gzip-debuginfo-1.3.5-11.el5_4.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-0001.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVx9NXlSAg2UNWIIRApjhAJ9+c+Bzh3mS1JbhhfDo40hd9sL31wCgwXuq jeUZSXwz0XzRRD8YzkEYAvc= =sDt9 -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Jan 20 15:22:27 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 20 Jan 2010 10:22:27 -0500 Subject: [RHSA-2010:0062-02] Moderate: bind security update Message-ID: <201001201522.o0KFMR3d025146@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: bind security update Advisory ID: RHSA-2010:0062-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0062.html Issue date: 2010-01-20 CVE Names: CVE-2010-0097 CVE-2010-0290 ===================================================================== 1. Summary: Updated bind packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was running as a DNSSEC-validating resolver, it could incorrectly cache NXDOMAIN responses, as if they were valid, for records proven by NSEC or NSEC3 to exist. A remote attacker could use this flaw to cause a BIND server to return the bogus, cached NXDOMAIN responses for valid records and prevent users from retrieving those records (denial of service). (CVE-2010-0097) The original fix for CVE-2009-4022 was found to be incomplete. BIND was incorrectly caching certain responses without performing proper DNSSEC validation. CNAME and DNAME records could be cached, without proper DNSSEC validation, when received from processing recursive client queries that requested DNSSEC records but indicated that checking should be disabled. A remote attacker could use this flaw to bypass the DNSSEC validation check and perform a cache poisoning attack if the target BIND server was receiving such client queries. (CVE-2010-0290) All BIND users are advised to upgrade to these updated packages, which contain a backported patch to resolve these issues. After installing the update, the BIND daemon (named) will be restarted automatically. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 554851 - CVE-2010-0097 BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses 557121 - CVE-2010-0290 BIND upstream fix for CVE-2009-4022 is incomplete 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.2.src.rpm i386: bind-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm x86_64: bind-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.2.src.rpm i386: bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm x86_64: bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/bind-9.3.6-4.P1.el5_4.2.src.rpm i386: bind-9.3.6-4.P1.el5_4.2.i386.rpm bind-chroot-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm bind-sdb-9.3.6-4.P1.el5_4.2.i386.rpm bind-utils-9.3.6-4.P1.el5_4.2.i386.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.i386.rpm ia64: bind-9.3.6-4.P1.el5_4.2.ia64.rpm bind-chroot-9.3.6-4.P1.el5_4.2.ia64.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.ia64.rpm bind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.ia64.rpm bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm bind-libs-9.3.6-4.P1.el5_4.2.ia64.rpm bind-sdb-9.3.6-4.P1.el5_4.2.ia64.rpm bind-utils-9.3.6-4.P1.el5_4.2.ia64.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.ia64.rpm ppc: bind-9.3.6-4.P1.el5_4.2.ppc.rpm bind-chroot-9.3.6-4.P1.el5_4.2.ppc.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.ppc.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.ppc64.rpm bind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm bind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.ppc64.rpm bind-libs-9.3.6-4.P1.el5_4.2.ppc.rpm bind-libs-9.3.6-4.P1.el5_4.2.ppc64.rpm bind-sdb-9.3.6-4.P1.el5_4.2.ppc.rpm bind-utils-9.3.6-4.P1.el5_4.2.ppc.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.ppc.rpm s390x: bind-9.3.6-4.P1.el5_4.2.s390x.rpm bind-chroot-9.3.6-4.P1.el5_4.2.s390x.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.s390.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.s390x.rpm bind-devel-9.3.6-4.P1.el5_4.2.s390.rpm bind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.s390x.rpm bind-libs-9.3.6-4.P1.el5_4.2.s390.rpm bind-libs-9.3.6-4.P1.el5_4.2.s390x.rpm bind-sdb-9.3.6-4.P1.el5_4.2.s390x.rpm bind-utils-9.3.6-4.P1.el5_4.2.s390x.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.s390x.rpm x86_64: bind-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-chroot-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.i386.rpm bind-debuginfo-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.i386.rpm bind-libbind-devel-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-libs-9.3.6-4.P1.el5_4.2.i386.rpm bind-libs-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-sdb-9.3.6-4.P1.el5_4.2.x86_64.rpm bind-utils-9.3.6-4.P1.el5_4.2.x86_64.rpm caching-nameserver-9.3.6-4.P1.el5_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-0097.html https://www.redhat.com/security/data/cve/CVE-2010-0290.html http://www.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLVx+GXlSAg2UNWIIRAvz/AJ9H7FhvT0s+dBH6WB0WLXqOi504SgCfSKp8 f06YLQzTf8bhbdzVt7HjWB4= =m8lV -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Jan 21 14:18:36 2010 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 21 Jan 2010 09:18:36 -0500 Subject: [RHSA-2010:0041-01] Important: kernel-rt security and bug fix update Message-ID: <201001211418.o0LEIavw013559@int-mx03.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2010:0041-01 Product: Red Hat Enterprise MRG for RHEL-5 Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0041.html Issue date: 2010-01-21 CVE Names: CVE-2009-3080 CVE-2009-4021 CVE-2009-4536 CVE-2009-4537 CVE-2009-4538 ===================================================================== 1. Summary: Updated kernel-rt packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise MRG 1.2. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: MRG Realtime for RHEL 5 Server - i386, noarch, x86_64 3. Description: The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * an array index error was found in the gdth driver in the Linux kernel. A local user could send a specially-crafted IOCTL request that would cause a denial of service or, possibly, privilege escalation. (CVE-2009-3080, Important) * a flaw was found in the FUSE implementation in the Linux kernel. When a system is low on memory, fuse_put_request() could dereference an invalid pointer, possibly leading to a local denial of service or privilege escalation. (CVE-2009-4021, Important) * a flaw was found in each of the following Intel PRO/1000 Linux drivers in the Linux kernel: e1000 and e1000e. A remote attacker using packets larger than the MTU could bypass the existing fragment check, resulting in partial, invalid frames being passed to the network stack. These flaws could also possibly be used to trigger a remote denial of service. (CVE-2009-4536, CVE-2009-4538, Important) * a flaw was found in the Realtek r8169 Ethernet driver in the Linux kernel. Receiving overly-long frames with a certain revision of the network cards supported by this driver could possibly result in a remote denial of service. (CVE-2009-4537, Important) This update also fixes the following bugs: * the "function tracer" from ftrace could eventually present problems when a module was unloaded during a tracing session. Some of the related call site entries for that module were not removed from ftrace's internal lists and could lead to confusing "oops" error messages. The call site entries are now removed correctly, and the errors no longer occur. (BZ#537472) * when using the kernel in tickless (or NOHZ) mode, time was not accumulated one tick at a time. This created latencies when the accumulated interval grew large. Time is now accumulated logarithmically and latencies related to tickless mode no longer occur. (BZ#538370) * running the "cset set" command was resulting in unsafe access to a structure that could be concurrently changed. This was eventually causing the kernel to crash. The operations were repositioned so that they no longer add locks, to minimize performance penalties. (BZ#541080) * the function used to calculate system load called different functions to count the tasks in running and interpretable states. On systems with a large number of CPUs, this could result in several TLB and cache misses. These functions have now been combined, and the problem has been significantly reduced. (BZ#552860) * when legacy PCI bus checks occurred, an off-by-one error would present. Scanning 255 PCI buses is now allowed as 0xff is a valid bus, and the error no longer occurs. (BZ#552874) * on systems with 8 or more CPUs, an unnecessary anon_vma lock acquisition in vma_adjust() was causing a decrease in throughput. Code from the upstream kernel was backported, and the throughput decrease no longer exists. (BZ#552876) * the scheduler function double_lock_balance() favors logically lower CPUs. This could cause logically higher CPUs to be starved if run queues were under a lot of pressure, resulting in latencies. The algorithm has been adjusted so that it is fairer, and logically higher CPUs no longer risk being starved. (BZ#552877) These updated packages also include other bug fixes. Users are directed to the Red Hat Enterprise MRG 1.2 Release Notes for information on those fixes, available shortly from: http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/ Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 537472 - ftrace function tracer triggers integrity check failure 538734 - CVE-2009-4021 kernel: fuse: prevent fuse_put_request on invalid pointer 539414 - CVE-2009-3080 kernel: gdth: Prevent negative offsets in ioctl 541080 - MRG Kernel crashes when we run "cset set" command, but the crash is random. 550907 - CVE-2009-4537 kernel: r8169 issue reported at 26c3 551214 - CVE-2009-4538 kernel: e1000e frame fragment issue 552126 - CVE-2009-4536 kernel: e1000 issue reported at 26c3 6. Package List: MRG Realtime for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHEMRG/SRPMS/kernel-rt-2.6.24.7-146.el5rt.src.rpm i386: kernel-rt-2.6.24.7-146.el5rt.i686.rpm kernel-rt-debug-2.6.24.7-146.el5rt.i686.rpm kernel-rt-debug-debuginfo-2.6.24.7-146.el5rt.i686.rpm kernel-rt-debug-devel-2.6.24.7-146.el5rt.i686.rpm kernel-rt-debuginfo-2.6.24.7-146.el5rt.i686.rpm kernel-rt-debuginfo-common-2.6.24.7-146.el5rt.i686.rpm kernel-rt-devel-2.6.24.7-146.el5rt.i686.rpm kernel-rt-trace-2.6.24.7-146.el5rt.i686.rpm kernel-rt-trace-debuginfo-2.6.24.7-146.el5rt.i686.rpm kernel-rt-trace-devel-2.6.24.7-146.el5rt.i686.rpm kernel-rt-vanilla-2.6.24.7-146.el5rt.i686.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-146.el5rt.i686.rpm kernel-rt-vanilla-devel-2.6.24.7-146.el5rt.i686.rpm noarch: kernel-rt-doc-2.6.24.7-146.el5rt.noarch.rpm x86_64: kernel-rt-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-debug-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-debug-debuginfo-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-debug-devel-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-debuginfo-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-debuginfo-common-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-devel-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-trace-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-trace-debuginfo-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-trace-devel-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-vanilla-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-vanilla-debuginfo-2.6.24.7-146.el5rt.x86_64.rpm kernel-rt-vanilla-devel-2.6.24.7-146.el5rt.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3080.html https://www.redhat.com/security/data/cve/CVE-2009-4021.html https://www.redhat.com/security/data/cve/CVE-2009-4536.html https://www.redhat.com/security/data/cve/CVE-2009-4537.html https://www.redhat.com/security/data/cve/CVE-2009-4538.html http://www.redhat.com/security/updates/classification/#important http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2010 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLWGGVXlSAg2UNWIIRAuKlAKCrKCUDQ3BIaeumzkFhWB8h+ORSAgCcCgb6 TYIyTlxPCjpZX4kQ8UVADOE= =+xaZ -----END PGP SIGNATURE-----