Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


More on LinuxToday


SecurityPortal -- Weekly Linux Security Digest - 2001/06/11 to 2001/06/17

Jun 18, 2001, 19:45 (2 Talkback[s])
(Other stories by Kurt Seifried)
============================================================
Weekly Linux Security Digest
2001/06/11 to 2001/06/17
============================================================

By Kurt Seifried (seifried@securityportal.com)

Weekly Linux Security Digest Archive
http://securityportal.com/research/research.wsl.html


------------------------------------------------------------
The Rundown
------------------------------------------------------------

Vendors playing catchup, probably the big news is a bug in xinetd that can
result in a variety of problems, if your vendor has issued updates (i.e. Red
Hat and Immunix) and you are using xinetd's logging you should upgrade
immediately. If you are using Red Hat at all for that matter there are a
large number of packages you need to be upgrading, including ispell, samba,
minicom and a few others. Apart from that a relatively quiet week in Linux
land.

We lead off with general advisories and exploit code, then move to vendor
advisories. Most items appear in alphabetical order. If we're missing a
Linux vendor's advisory, please tell us - ditto for any Linux-related
security alerts. The long strings of hex in front of package names are MD5
signatures.

Exploits are housed here.
http://securityportal.com/research/exploits/linux/


------------------------------------------------------------
Vendor Corner
------------------------------------------------------------

Interested in information security? Try an InfoSec University course!

010 Information Security Fundamentals
081 Information Privacy
101 Computer Crimes & Abuse
110 Policies
130 Access Controls, Systems, & Methods
160 Incident Response
161 Malware Basics
170 Introduction to Cryptography
261 Intrusion Detection in Networks
262 Fighting Malware

InfoSec University
http://securityportal.com/php/t.php?s=3170&l=9


------------------------------------------------------------
General Advisories and Exploits
------------------------------------------------------------


None this week.


------------------------------------------------------------
Announcements of New Tools/Projects
------------------------------------------------------------


--  Linux Security Discuss --

>From the announcement by Kurt Seifried (me):

I've created a new list for moderated Linux security discussion named
"linux-security-discuss" oddly enough. To sign up please see:

https://lists.securityportal.com/mailman/listinfo/linux-security-discuss

Like I said it's moderated, so it won't be too spammy (if volume ever gets
high enough I'll look into breaking it down into sub-topics). I and
hopefully a few other SecurityPortal people will make an effort to answer
questions, so that the list is useful (unlike some others).

Enjoy.

Kurt Seifried, seifried@securityportal.com
PGP Key ID: 0xAD56E574
Fingerprint: A15B BEE5 B391 B9AD B0EF AEB0 AD63 0B4E AD56 E574
http://www.securityportal.com/


------------------------------------------------------------
Vendor Advisories and Patches
------------------------------------------------------------


--  Caldera  --

No patches issued.


--  Conectiva  --

CLA-2001:402 - exim - "exim" is a popular mail server (MTA) that is included
in many GNU/Linux distributions. Megyer Laszlo reported a format bug
vulnerability in the exim package that could lead to a compromise if exim is
run as root. This software is not installed by default on Conectiva Linux
6.0 and, even if installed, the default configuration is not vulnerable
because it does not include the "headers_check_syntax" option in the
/etc/exim.conf configuration file which is needed to trigger the bug. If,
however, that option is enabled, and exim is also used to process batched
SMTP input (via the -bS command-line option), then the service becomes
vulnerable and a remote attack becomes possible.

ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/exim-3.16-4U60_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/exim-3.16-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/exim-doc-3.16-4U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/exim-mon-3.16-4U60_1cl.i386.rpm


--  Debian  --

DSA-059-1 - man-db - Luki R. reported a bug in man-db: it did handle nested
calls of drop_effective_privs() and regain_effective_privs() correctly which
would cause it to regain privileges to early. This could be abused to make
man create files as user man.

1ab2ce2ae42f04788123ca846481dfbb
http://security.debian.org/dists/stable/updates/main/source/man-db_2.3.16-4.dsc

88449c2f090bfb620980996c78fc8193
http://security.debian.org/dists/stable/updates/main/source/man-db_2.3.16-4.tar.gz

4cfb3906c406b75917f9c58cb1486f36
http://security.debian.org/dists/stable/updates/main/binary-alpha/man-db_2.3.16-4_alpha.deb

3edfbd8f52b2636ff6a5bc27f9fa1aaa
http://security.debian.org/dists/stable/updates/main/binary-arm/man-db_2.3.16-4_arm.deb

652668ab57978209225b4cce92afd7f2
http://security.debian.org/dists/stable/updates/main/binary-i386/man-db_2.3.16-4_i386.deb

613fed5e773cb31ac50e8c29edfd35c5
http://security.debian.org/dists/stable/updates/main/binary-m68k/man-db_2.3.16-4_m68k.deb

d70fd2e5b6df82841e628c2a7a9bca97
http://security.debian.org/dists/stable/updates/main/binary-powerpc/man-db_2.3.16-4_powerpc.deb

02168687d2c2f72d49337b7ce14d01ca
http://security.debian.org/dists/stable/updates/main/binary-sparc/man-db_2.3.16-4_sparc.deb


--  EnGarde  --

No patches issued.


--  ImmunixOS --

IMNX-2001-70-024-01 - xinetd - xinetd in the base Immunix OS 7.0 initially
set its umask value to 0. This allows any services started via xinetd to
create files that are world-writable unless the service changes its umask
before creating files or specifies file modes when creating files. There is
also a buffer overflow; StackGuard prevents this from being used to gain
privileges, though an attacker could remotely kill the xinetd daemon. The
default configuration of Immunix OS 7.0 has only wu-ftpd enabled; wu-ftpd
appears to be careful when creating files to set the modes more
restrictively, though we have not conducted an extensive audit. Users who
have enabled other services may be at higher risk. A service known to be
vulnerable is Samba's SWAT tool. Immunix OS 6.2 used inetd rather than
xinetd and is not vulnerable. Everyone is encouraged to upgrade xinetd;
those who have enabled other services or used identd logging should upgrade
xinetd quickly and examine their systems for world-writable files.

8841c6a1d15a063ca1bb16ba132e0f7d
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/xinetd-2.1.8.9pre15-2_imnx.i386.rpm

da497d94349ab3d1b2e0713be4595875
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/xinetd-2.1.8.9pre15-2_imnx.src.rpm


IMNX-2001-70-025-01 - fetchmail - Fetchmail, as shipped with Immunix OS 6.2
and 7.0, contains a buffer overflow in the handling of headers. StackGuard
will prevent exploits from granting privileges; however, denial of service
attacks are possible.

ea10b64694935dd20be38df09924736a
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmail-5.3.1-2_StackGuard.i386.rpm

fdebb78fcabdc43a811f9ed546252850
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/fetchmailconf-5.3.1-2_StackGuard.i386.rpm

eb7af556575d1d0e6e59976aa5b09730
http://download.immunix.org/ImmunixOS/6.2/updates/SRPMS/fetchmail-5.3.1-2_StackGuard.src.rpm

e8169308534f68bc978ed2c1bc0aeeca
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmail-5.5.0-4_imnx.i386.rpm

242f4aa0fe21c71f1ddce4cf5c6cb0a0
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/fetchmailconf-5.5.0-4_imnx.i386.rpm

c8c4069439fe66caf013fea502947ada
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/fetchmail-5.5.0-4_imnx.src.rpm


MNX-2001-70-026-01 - sysklogd - The Linux kernel logging daemon klogd
distributed in the sysklogd package can be forced to quit if it receives a
null byte in a log message from the Linux kernel. These updates have applied
a patch from roessler at does-not-exist dot org to fix this problem. Because
an attacker would need to convince the kernel to log a null byte in order to
exploit this problem, we don't think it is an issue for most sites; however,
the bug was found when a kernel module supplied with kernel 2.4 attempted to
print a null byte.

8f1dca74c72179aba3a04226f916b4a2
http://download.immunix.org/ImmunixOS/6.2/updates/RPMS/sysklogd-1.3.31-18_StackGuard.i386.rpm

4fdf88fd615bce2d730915d5812eaf97
http://download.immunix.org/ImmunixOS/6.2/updates/SRPMS/sysklogd-1.3.31-18_StackGuard.src.rpm

577a073a871475704a68fde712a90b1e
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/sysklogd-1.3.33-9_imnx.i386.rpm

3add2ae895e9c4dad1e9737807cc1f30
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/sysklogd-1.3.33-9_imnx.src.rpm


--  Mandrake  --

MDKSA-2001:054 - imap - Several buffer overflow vulnerabilities have been
found in the UW-IMAP package by the authors and independent groups. These
vulnerabilities can be exploited only once a user has authenticated which
limits the extent of the vulnerability to a remote shell with that user's
permissions. On systems where the user already has a shell, nothing new will
be provided to that user, unless the user has only local shell access. On
systems where the email accounts do not provide shell access, however, the
problem is much greater.

6bf29864715e9a7fcfca87fcbba9774f
7.1/RPMS/imap-2000c-4.6mdk.i586.rpm

a0868dc57cf7ce8a39baeba197d44132
7.1/RPMS/imap-devel-2000c-4.6mdk.i586.rpm

e574413ee56c8a30bcc907e4a3042eac
7.1/SRPMS/imap-2000c-4.6mdk.src.rpm

84255f2e48d8941a9ebfc9b96aa29485
7.2/RPMS/imap-2000c-4.5mdk.i586.rpm

641bb3f1c7a89d21826074a24f1f480f
7.2/RPMS/imap-devel-2000c-4.5mdk.i586.rpm

0e123cce424178305fb86e739c198734
7.2/SRPMS/imap-2000c-4.5mdk.src.rpm

6a452cc1dc11d0b4e463bad8ad72c76f
8.0/RPMS/imap-2000c-4.4mdk.i586.rpm

b5e240934dce233b30b3b9b3dd378548
8.0/RPMS/imap-devel-2000c-4.4mdk.i586.rpm

7e3c70c61268f0cc2ee129d17e363897
8.0/SRPMS/imap-2000c-4.4mdk.src.rpm

6bf29864715e9a7fcfca87fcbba9774f
1.0.1/RPMS/imap-2000c-4.6mdk.i586.rpm

a0868dc57cf7ce8a39baeba197d44132
1.0.1/RPMS/imap-devel-2000c-4.6mdk.i586.rpm

e574413ee56c8a30bcc907e4a3042eac
1.0.1/SRPMS/imap-2000c-4.6mdk.src.rpm


MDKSA-2001:055 - xinetd - A bug exists in xinetd as shipped with Mandrake
Linux 8.0 dealing with TCP connections with the WAIT state that prevents
linuxconf-web from working properly. As well, xinetd contains a security
flaw in which it defaults to a umask of 0. This means that applications
using the xinetd umask that do not set permissions themselves (like SWAT, a
web configuration tool for Samba), will create world writable files. This
update sets the default umask to 022.

dcfddcde15315b6798d4303096eb41b6
7.2/RPMS/xinetd-2.1.8.9pre15-1.2mdk.i586.rpm

06f6fe56ea492d021538863f08c297ce
7.2/SRPMS/xinetd-2.1.8.9pre15-1.2mdk.src.rpm

b5e1f34214417502ca891bd3993a50c5
8.0/RPMS/xinetd-2.1.8.9pre15-1.1mdk.i586.rpm

683f1ce09c630432cf5cd876ef9f0f65
8.0/RPMS/xinetd-ipv6-2.1.8.9pre15-1.1mdk.i586.rpm

e6902c3dd3b9c321f41d2bf95d260972
8.0/SRPMS/xinetd-2.1.8.9pre15-1.1mdk.src.rpm

dcfddcde15315b6798d4303096eb41b6
snf7.2/RPMS/xinetd-2.1.8.9pre15-1.2mdk.i586.rpm

06f6fe56ea492d021538863f08c297ce
snf7.2/SRPMS/xinetd-2.1.8.9pre15-1.2mdk.src.rpm



MDKSA-2001:056 - tcpdump - A number of remote buffer overflows were
discovered in the tcpdump package that would allow a remote attack of the
local tcpdump process. Intrusion detection using tcpdump would no longer be
useful due to the attack stoping all network activity on the system. As
well, this new version of tcpdump fixes the vulnerability with decoding AFS
ACL packets, which would allow a remote attacker to run arbitrary code on
the local system with root privilege.

c8fe383f342db8606260542467d3e07f
7.1/RPMS/tcpdump-3.6.2-1.2mdk.i586.rpm

6674b50123f67f5726dace651ee56e40
7.1/SRPMS/tcpdump-3.6.2-1.2mdk.src.rpm

a1439b909ba27750442eebbbee5e08df
7.2/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm

645e03ddc0b4460408d520f60cf717be
7.2/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm

80b8a68f8e39611ae50d51fe687abe40
8.0/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm

645e03ddc0b4460408d520f60cf717be
8.0/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm

c8fe383f342db8606260542467d3e07f
1.0.1/RPMS/tcpdump-3.6.2-1.2mdk.i586.rpm

6674b50123f67f5726dace651ee56e40
1.0.1/SRPMS/tcpdump-3.6.2-1.2mdk.src.rpm

a1439b909ba27750442eebbbee5e08df
snf7.2/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm

645e03ddc0b4460408d520f60cf717be
snf7.2/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm


--  Progeny --

No patches issued.


--  Red Hat  --

RHSA-2001:044-08 - samba - New samba packages are available; these packages
fix /tmp races in smbclient and the printing code. By exploiting these
vulnerabilities, local users could overwrite any file in the system. The
printing code in smbd uses predictable filenames in /tmp, and passes them as
an output file to system(); a user could create a symbolic link in /tmp and
then overwrite any file on the system; later on chmod(0666) is called on the
file, leading to even more problems. The smbclient 'more' and 'mput'
commands also used /tmp files insecurely; this is less of a risk in that
these are not normally run as root. Thanks go to Marcus Meissner
(mm@caldera.de) for investigating the issue and to the Samba team for
providing a patch.

c13389ba4bf3318b49e19b6469b2e0fe
ftp://updates.redhat.com/5.2/en/os/SRPMS/samba-2.0.5a-2.5.2.src.rpm

3f0a195dbf5a363459926806185e80ba
ftp://updates.redhat.com/5.2/en/os/alpha/samba-2.0.5a-2.5.2.alpha.rpm

58aa6febd254fc1e0784fbf6cfcfff02
ftp://updates.redhat.com/5.2/en/os/alpha/samba-client-2.0.5a-2.5.2.alpha.rpm

9a12a093f101c98a1532e37299c484ce
ftp://updates.redhat.com/5.2/en/os/i386/samba-2.0.5a-2.5.2.i386.rpm

5fda5f6989dea440ccdaf08446412ba9
ftp://updates.redhat.com/5.2/en/os/i386/samba-client-2.0.5a-2.5.2.i386.rpm

854c4cb488ab388141b99d477faf3e86
ftp://updates.redhat.com/5.2/en/os/sparc/samba-2.0.5a-2.5.2.sparc.rpm

9352f1fda00801b00e63a899770ff8de
ftp://updates.redhat.com/5.2/en/os/sparc/samba-client-2.0.5a-2.5.2.sparc.rpm

335f2123c5ce3606db471183dfcdebad
ftp://updates.redhat.com/6.2/en/os/SRPMS/logrotate-3.5.2-0.6.src.rpm

e4e697ad704a84c2ea4606be6ed19f5f
ftp://updates.redhat.com/6.2/en/os/SRPMS/samba-2.0.8-1.6.src.rpm

f0f9129497c91d12da04cd6219267aa3
ftp://updates.redhat.com/6.2/en/os/alpha/logrotate-3.5.2-0.6.alpha.rpm

9622500299782f17bda3657f85a9ad05
ftp://updates.redhat.com/6.2/en/os/alpha/samba-2.0.8-1.6.alpha.rpm

c612a2092a1b03295b7d9d9c25af583d
ftp://updates.redhat.com/6.2/en/os/alpha/samba-client-2.0.8-1.6.alpha.rpm

7fdd3bdafd9833e33167b33d19d3058f
ftp://updates.redhat.com/6.2/en/os/alpha/samba-common-2.0.8-1.6.alpha.rpm

33f4ce1b7967405f33f4ad1cb73fae35
ftp://updates.redhat.com/6.2/en/os/i386/logrotate-3.5.2-0.6.i386.rpm

edcecaa0c060f2371225d14ba5f6d908
ftp://updates.redhat.com/6.2/en/os/i386/samba-2.0.8-1.6.i386.rpm

21acd09eb2072ec859a622f91d2aaca2
ftp://updates.redhat.com/6.2/en/os/i386/samba-client-2.0.8-1.6.i386.rpm

917694eaf3f0d1f640e7ac9ec9acb329
ftp://updates.redhat.com/6.2/en/os/i386/samba-common-2.0.8-1.6.i386.rpm

3f14ee70fdb73ba09ef49e4c4f3c6a7f
ftp://updates.redhat.com/6.2/en/os/sparc/logrotate-3.5.2-0.6.sparc.rpm

7dd43e058143351a4605df173ede02a3
ftp://updates.redhat.com/6.2/en/os/sparc/samba-2.0.8-1.6.sparc.rpm

478fbb5206d9a32208a63202bb5237c5
ftp://updates.redhat.com/6.2/en/os/sparc/samba-client-2.0.8-1.6.sparc.rpm

9024c3b3e1a8ce90e9545979b5fd97f2
ftp://updates.redhat.com/6.2/en/os/sparc/samba-common-2.0.8-1.6.sparc.rpm

79e6f09ba81d43ee261a278ffd28e60a
ftp://updates.redhat.com/7.0/en/os/SRPMS/samba-2.0.8-1.7.src.rpm

cbfae3f2420cfae17b005211a8fdf692
ftp://updates.redhat.com/7.0/en/os/alpha/samba-2.0.8-1.7.alpha.rpm

f09d86bd2a942bfea3a89b00960584e3
ftp://updates.redhat.com/7.0/en/os/alpha/samba-client-2.0.8-1.7.alpha.rpm

a201143cad04e8cf7c199b247bcab800
ftp://updates.redhat.com/7.0/en/os/alpha/samba-common-2.0.8-1.7.alpha.rpm

a8ab5a701ae81d123b45e564e6a780d4
ftp://updates.redhat.com/7.0/en/os/i386/samba-2.0.8-1.7.i386.rpm

e7cd3ef7cad58e3be9ae72aa7e7a2b33
ftp://updates.redhat.com/7.0/en/os/i386/samba-client-2.0.8-1.7.i386.rpm

2ea653688e214f9b0ca6619967f77076
ftp://updates.redhat.com/7.0/en/os/i386/samba-common-2.0.8-1.7.i386.rpm

54613f26efbbfe5c2664bee923e63ce4
ftp://updates.redhat.com/ftp://updates.redhat.com/7.1/en/os/SRPMS/samba-2.0.8-1.7.1.src.rpm

282c70feb595b651804678407b7d7b08
ftp://updates.redhat.com/7.1/en/os/i386/samba-2.0.8-1.7.1.i386.rpm

6e529dfb18f06b18360c755018864f8f
ftp://updates.redhat.com/7.1/en/os/i386/samba-client-2.0.8-1.7.1.i386.rpm

e5f9759330d4ac09ea02ddead9c461e1
ftp://updates.redhat.com/7.1/en/os/i386/samba-common-2.0.8-1.7.1.i386.rpm

6033af45917b0cbe447187ea56aeaefa
ftp://updates.redhat.com/7.1/en/os/i386/samba-swat-2.0.8-1.7.1.i386.rpm


RHSA-2001:065-05 - zope - New Zope packages are available which fix a
security flaw with ZClass. This package includes a "hotfix" product which
addresses a security problem with ZClasses, as descripbed in the
Hotfix_2001-05-01 README.txt file: "The issue is related to ZClasses in that
any user can visit a ZClass declaration and change the ZClass permission
mappings for methods and other objects defined within the ZClass, possibly
allowing for unauthorized access within the Zope instance."

8d8883fba8b93f46663a22b9453b704
ftp://updates.redhat.com/6.2/en/powertools/SRPMS/Zope-2.2.4-7.src.rpm

60e6795963fe1dfd2c41216db13f2abd
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-2.2.4-7.alpha.rpm

312f409da0312d78087c5f22713d2972
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-components-2.2.4-7.alpha.rpm

611b719f9a135d2954aa4e1f98761c75
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-core-2.2.4-7.alpha.rpm

472c9399c5b5436c06c10f886d48270a
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-pcgi-2.2.4-7.alpha.rpm

310cd4e8d8c99a48d6efe6159c45bf15
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-services-2.2.4-7.alpha.rpm

6814549a40440a5c1aa32155bca66c03
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-zpublisher-2.2.4-7.alpha.rpm

96fc568da7466af73f2fb056313446b8
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-zserver-2.2.4-7.alpha.rpm

251704804aa579ecbe14a2e08df7ba83
ftp://updates.redhat.com/6.2/en/powertools/alpha/Zope-ztemplates-2.2.4-7.alpha.rpm

9d412bb7abf56bfcd87fe950031e76cf
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-2.2.4-7.i386.rpm

86445651972ca85c51cc8d80814320f3
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-components-2.2.4-7.i386.rpm

c18bb610245f0a69723f5bbe3617a762
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-core-2.2.4-7.i386.rpm

1e1cb85815d08bad6f1380235c709235
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-pcgi-2.2.4-7.i386.rpm

6e2649efb3f63a0a7cc6c36a866caa31
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-services-2.2.4-7.i386.rpm

485350f1457f5ab8f2b8a8b76281a6bc
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-zpublisher-2.2.4-7.i386.rpm

52ebb265edc86478f1b966a362127c4f
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-zserver-2.2.4-7.i386.rpm

7475a10000023d5b7161986e654fa7eb
ftp://updates.redhat.com/6.2/en/powertools/i386/Zope-ztemplates-2.2.4-7.i386.rpm

16772d94da2dddfdc9581c166a5580fc
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-2.2.4-7.sparc.rpm

2661262f459731a3526322eee18bf837
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-components-2.2.4-7.sparc.rpm

095bfb4731b33e9641ef07e23dabaa77
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-core-2.2.4-7.sparc.rpm

6b8c33d75f9992f232d46ae7c218ba8c
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-pcgi-2.2.4-7.sparc.rpm

7714c0b5701a35d68999e6a56ffe4d8f
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-services-2.2.4-7.sparc.rpm

62b9a1d8776664bd179eedea6462e264
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-zpublisher-2.2.4-7.sparc.rpm

9dcec718a2c240dfdb6a57f016f622b7
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-zserver-2.2.4-7.sparc.rpm

294061ae90c35fa6d59545d8e2f9c481
ftp://updates.redhat.com/6.2/en/powertools/sparc/Zope-ztemplates-2.2.4-7.sparc.rpm

fd0da348b8cc62664ea46bdcf118bfe4
ftp://updates.redhat.com/7.0/en/powertools/SRPMS/Zope-2.2.5-6.src.rpm

11b0278d0b09896366cb7c161fd28002
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-2.2.5-6.alpha.rpm

7ed1edb7f4e24dc6a2f52b6fd2c4cd4d
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-components-2.2.5-6.alpha.rpm

8f51620d8a6515411c5add627fd93dd2
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-core-2.2.5-6.alpha.rpm

1c6050a604b2c60393505f80c33af9cb
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-pcgi-2.2.5-6.alpha.rpm

986403228735ac040d3cdcdb723380d5
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-services-2.2.5-6.alpha.rpm

c4eb9d9d11ec4849dbf094f435fc6c6f
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-zpublisher-2.2.5-6.alpha.rpm

f7067d836ecedd206de3ee8ee784c28c
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-zserver-2.2.5-6.alpha.rpm

49e8471b1658a8fdba3912cf5a2f5702
ftp://updates.redhat.com/7.0/en/powertools/alpha/Zope-ztemplates-2.2.5-6.alpha.rpm

f37781f1f1e9c269fc99665948e9a982
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-2.2.5-6.i386.rpm

2273a92eb0977cf3d1314c25ab1c9641
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-components-2.2.5-6.i386.rpm

a22e60c220fbac47102fc8e2215d7e5a
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-core-2.2.5-6.i386.rpm

f4f588636465b95910f98608bf39e165
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-pcgi-2.2.5-6.i386.rpm

220f5e45dd5aa32c2a410e0a37175ce3
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-services-2.2.5-6.i386.rpm

cfaa9c3fd88aa1eb034ada8be34a0163
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-zpublisher-2.2.5-6.i386.rpm

01dfc35688a0dda4e7d864f127a69792
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-zserver-2.2.5-6.i386.rpm

3058e069563cc7d986db91feebca9add
ftp://updates.redhat.com/7.0/en/powertools/i386/Zope-ztemplates-2.2.5-6.i386.rpm

fd0da348b8cc62664ea46bdcf118bfe4
ftp://updates.redhat.com/7.1/en/powertools/SRPMS/Zope-2.2.5-6.src.rpm

f37781f1f1e9c269fc99665948e9a982
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-2.2.5-6.i386.rpm

2273a92eb0977cf3d1314c25ab1c9641
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-components-2.2.5-6.i386.rpm

a22e60c220fbac47102fc8e2215d7e5a
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-core-2.2.5-6.i386.rpm

f4f588636465b95910f98608bf39e165
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-pcgi-2.2.5-6.i386.rpm

220f5e45dd5aa32c2a410e0a37175ce3
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-services-2.2.5-6.i386.rpm

cfaa9c3fd88aa1eb034ada8be34a0163
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-zpublisher-2.2.5-6.i386.rpm

01dfc35688a0dda4e7d864f127a69792
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-zserver-2.2.5-6.i386.rpm

3058e069563cc7d986db91feebca9add
ftp://updates.redhat.com/7.1/en/powertools/i386/Zope-ztemplates-2.2.5-6.i386.rpm


RHSA-2001:067-03 - minicom - The minicom program allows any user with local
shell access to obtain group uucp priveledges. It may also be possible for
the malicious user to obtain root priveledges as well. Minicom contains a
great number of format string abuses in it's usage of several printf-like
varargs functions. The program was never written with security in mind, and
as such even though many format strings bugs have been fixed in this
release, there are many more lurking in the code. This release solves the
security problem by disabling setgid uucp on the minicom binary.

5991bffcfbe2900f4522c03b981ae0bb
ftp://updates.redhat.com/5.2/en/os/SRPMS/minicom-1.83.1-1.0.5x.src.rpm

b0f31c02364c8fa9cc296eaa8e5e25d6
ftp://updates.redhat.com/5.2/en/os/alpha/minicom-1.83.1-1.0.5x.alpha.rpm

e7875eb52e0b1166be8b1dd7e540dfa1
ftp://updates.redhat.com/5.2/en/os/i386/minicom-1.83.1-1.0.5x.i386.rpm

2b844a4be94f692973c5d8e8e1cd0eb9
ftp://updates.redhat.com/5.2/en/os/sparc/minicom-1.83.1-1.0.5x.sparc.rpm

d6ecd41e7df093ca62f8d1ab15a2d51c
ftp://updates.redhat.com/6.2/en/os/SRPMS/minicom-1.83.1-1.0.6x.src.rpm

b27358ca1604b2ca5fa8ec6a34fa6349
ftp://updates.redhat.com/6.2/en/os/alpha/minicom-1.83.1-1.0.6x.alpha.rpm

158495648d2d3f8a2636d345249fc01a
ftp://updates.redhat.com/6.2/en/os/i386/minicom-1.83.1-1.0.6x.i386.rpm

ca9069a87bfa81fe730cb8f31378e57a
ftp://updates.redhat.com/6.2/en/os/sparc/minicom-1.83.1-1.0.6x.sparc.rpm

eb41cbef4946cccb1e1e388a88bf4e88
ftp://updates.redhat.com/7.0/en/os/SRPMS/minicom-1.83.1-8.src.rpm

2da88e6d8479ccb35078ec1a469b3568
ftp://updates.redhat.com/7.0/en/os/alpha/minicom-1.83.1-8.alpha.rpm

5567d943ad44b7f44e332576edabdb5e
ftp://updates.redhat.com/7.0/en/os/i386/minicom-1.83.1-8.i386.rpm

599a686fa0598467f5ee451f934c8a28
ftp://updates.redhat.com/7.1/en/os/SRPMS/minicom-1.83.1-8.src.rpm

5cfe67255b3ec7df6c3f1b274da3c7ad
ftp://updates.redhat.com/7.1/en/os/i386/minicom-1.83.1-8.i386.rpm


RHSA-2001:073-04 - GnuPG - Updated GnuPG packages are now available for Red
Hat Linux 6.2, 7, and 7.1. Versions of GnuPG up to and including 1.0.5
include a format string vulnerability. In some cases, this can lead to
compromise of an account being used to decrypt an encrypted file.

b2046048050eecd78b51846900294168
ftp://updates.redhat.com/6.2/en/os/SRPMS/gnupg-1.0.6-0.6.x.src.rpm

31b8f7719b4ae95a930aeb291a8cd64a
ftp://updates.redhat.com/6.2/en/os/alpha/gnupg-1.0.6-0.6.x.alpha.rpm

6a79e3e9f0b7d45ae6ac7dc3296c4277
ftp://updates.redhat.com/6.2/en/os/i386/gnupg-1.0.6-0.6.x.i386.rpm

36fee998e3e74d36d46f8f7099b6f2ac
ftp://updates.redhat.com/6.2/en/os/sparc/gnupg-1.0.6-0.6.x.sparc.rpm

95aa4c72a640b4badfa6462ee7ea61c1
ftp://updates.redhat.com/7.0/en/os/SRPMS/gnupg-1.0.6-1.src.rpm

de001c49c523c54369bb067ee3db40d0
ftp://updates.redhat.com/7.0/en/os/alpha/gnupg-1.0.6-1.alpha.rpm

06dea237f91666032224592e2af68894
ftp://updates.redhat.com/7.0/en/os/i386/gnupg-1.0.6-1.i386.rpm

95aa4c72a640b4badfa6462ee7ea61c1
ftp://updates.redhat.com/7.1/en/os/SRPMS/gnupg-1.0.6-1.src.rpm

06dea237f91666032224592e2af68894
ftp://updates.redhat.com/7.1/en/os/i386/gnupg-1.0.6-1.i386.rpm


RHSA-2001:074-03 - ispell - The ispell program uses mktemp() to open
temporary files - this makes it vulnerable to symlink attacks. The ispell
program uses mktemp() to open temporary files - this makes it vulnerable to
symlink attacks. This version now uses mkstemp(), and also switches from
gets() to fgets() in two locations dealing with user input. The patches for
ispell are from OpenBSD.

9ce7ba3f8dbc0335e6cd4017e4ebcbef
ftp://updates.redhat.com/5.2/en/os/SRPMS/ispell-3.1.20-26.52.src.rpm

87ad28032177daed75cece422c05c233
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-3.1.20-26.52.alpha.rpm

e253033de16bc2311d4d9c981d727afc
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-catalan-3.1.20-26.52.alpha.rpm

048471e497558a8fe7882a22ba8a05bd
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-czech-3.1.20-26.52.alpha.rpm

85e1e58342f5cb02ebe3fda207102695
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-danish-3.1.20-26.52.alpha.rpm

0d0ad1da0117e121c11c10c3e8c8a50a
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-dicts-3.1.20-26.52.alpha.rpm

5d30eb71f665fe16a4bd19846be21bcb
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-dutch-3.1.20-26.52.alpha.rpm

b773a72beb09723b1367b421be048400
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-esperanto-3.1.20-26.52.alpha.rpm

9489700d7cd12dc3524aaab7c53368ae
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-french-3.1.20-26.52.alpha.rpm

e379214389e611453ac89784ad457274
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-german-3.1.20-26.52.alpha.rpm

29e4cfb32883b46dd9f067604ecdc315
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-greek-3.1.20-26.52.alpha.rpm

1a6ef0d48a975df133d107b8c8ac5039
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-italian-3.1.20-26.52.alpha.rpm

91ee4ff636292d6d59f0d5b5c5df684f
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-norwegian-3.1.20-26.52.alpha.rpm

e7bc54503c8ed7e6830bf0ba1f1c07ea
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-polish-3.1.20-26.52.alpha.rpm

e695c5a1043cef74ee75777a804cecd7
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-portuguese-3.1.20-26.52.alpha.rpm

16a17f8b2f6b3b48c2709aeb5b875af9
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-russian-3.1.20-26.52.alpha.rpm

b121c1d7f65b2237f565d7164beeaaeb
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-spanish-3.1.20-26.52.alpha.rpm

f3cc54b5e290a4d18cbf82d32397a6e6
ftp://updates.redhat.com/5.2/en/os/alpha/ispell-swedish-3.1.20-26.52.alpha.rpm

c86dd4697d1910ef5fb772889badc67c
ftp://updates.redhat.com/5.2/en/os/i386/ispell-3.1.20-26.52.i386.rpm

cfa3a914a090d0ca37a9d8186d62f391
ftp://updates.redhat.com/5.2/en/os/i386/ispell-catalan-3.1.20-26.52.i386.rpm

7ea5f7fa804c236706870be56d0f837b
ftp://updates.redhat.com/5.2/en/os/i386/ispell-czech-3.1.20-26.52.i386.rpm

25d44852740d43e3bbe34e1cbd0ebaed
ftp://updates.redhat.com/5.2/en/os/i386/ispell-danish-3.1.20-26.52.i386.rpm

d0f6e948793d0968cad84c34d4a863b9
ftp://updates.redhat.com/5.2/en/os/i386/ispell-dicts-3.1.20-26.52.i386.rpm

2455dacf258bb5465934984c32f83981
ftp://updates.redhat.com/5.2/en/os/i386/ispell-dutch-3.1.20-26.52.i386.rpm

3e799900a670c236110ef6151bcbc109
ftp://updates.redhat.com/5.2/en/os/i386/ispell-esperanto-3.1.20-26.52.i386.rpm

17a617b6f3453031e5382d6ec4380416
ftp://updates.redhat.com/5.2/en/os/i386/ispell-french-3.1.20-26.52.i386.rpm

518c219aeac0ad6e7f85fc09712cd838
ftp://updates.redhat.com/5.2/en/os/i386/ispell-german-3.1.20-26.52.i386.rpm

a70044c22e03aa6020a0bc3850e1e164
ftp://updates.redhat.com/5.2/en/os/i386/ispell-greek-3.1.20-26.52.i386.rpm

109e0d1f8afca0073c63087e6549bb3f
ftp://updates.redhat.com/5.2/en/os/i386/ispell-italian-3.1.20-26.52.i386.rpm

eae84e73873705f06cd1adb6e084c9e2
ftp://updates.redhat.com/5.2/en/os/i386/ispell-norwegian-3.1.20-26.52.i386.rpm

f1c308a61d94191d7cb618a8f9c3e063
ftp://updates.redhat.com/5.2/en/os/i386/ispell-polish-3.1.20-26.52.i386.rpm

71257d58e3e576626cd97a04d1e81183
ftp://updates.redhat.com/5.2/en/os/i386/ispell-portuguese-3.1.20-26.52.i386.rpm

2482ba34b0103bee8fd69a23e69b144d
ftp://updates.redhat.com/5.2/en/os/i386/ispell-russian-3.1.20-26.52.i386.rpm

94253937fa705cc46232ed8d8ed1fd5f
ftp://updates.redhat.com/5.2/en/os/i386/ispell-spanish-3.1.20-26.52.i386.rpm

0bfaa209ddfb693d655b8fad957613b2
ftp://updates.redhat.com/5.2/en/os/i386/ispell-swedish-3.1.20-26.52.i386.rpm

cac622360279289f928955819241c6ee
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-3.1.20-26.52.sparc.rpm

d0c4fafae080f6bb04be9c1fe9be176b
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-catalan-3.1.20-26.52.sparc.rpm

721f858f6a47f56743ca5d992fdcfcf6
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-czech-3.1.20-26.52.sparc.rpm

6e21c0f8bbe83ac46584deed872370b1
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-danish-3.1.20-26.52.sparc.rpm

bb06fa7409667951f4738f154485afd7
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-dicts-3.1.20-26.52.sparc.rpm

90ebf732a2bc8c130209edbf2fddb90c
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-dutch-3.1.20-26.52.sparc.rpm

9e365997cbdc9983a07448e69074a62e
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-esperanto-3.1.20-26.52.sparc.rpm

9ae608868ec036f68d2bbf40d0461047
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-french-3.1.20-26.52.sparc.rpm

4d492f52a8f6ead87fa2a7c5a2e85370
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-german-3.1.20-26.52.sparc.rpm

0c540b789efebe0b1fe3b2a34653578f
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-greek-3.1.20-26.52.sparc.rpm

f6d379d747ae0cd8633188afae4145b2
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-italian-3.1.20-26.52.sparc.rpm

ad724965b0927a258170b26c46332f32
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-norwegian-3.1.20-26.52.sparc.rpm

488293d786fae473e22046fad8da3d3c
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-polish-3.1.20-26.52.sparc.rpm

6aea646c3048ee5b0220ae11d71303f0
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-portuguese-3.1.20-26.52.sparc.rpm

58559197111d51d9c35e6483b369c3d2
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-russian-3.1.20-26.52.sparc.rpm

71757843921b15e2f5513db6d37d0a84
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-spanish-3.1.20-26.52.sparc.rpm

5eee7125a198cdd7ea507ee5db819c6f
ftp://updates.redhat.com/5.2/en/os/sparc/ispell-swedish-3.1.20-26.52.sparc.rpm

1fb4eef6a8726c49010957dfbe5d2012
ftp://updates.redhat.com/6.2/en/os/SRPMS/ispell-3.1.20-27.src.rpm

38e242f1d938d4f13b1bd1dbb7f6670b
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-3.1.20-27.alpha.rpm

61baba4f379b91e49d1534b907816856
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-catalan-3.1.20-27.alpha.rpm

86ec32eb0b1d0265a5d3dca0da594911
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-czech-3.1.20-27.alpha.rpm

950c82064dc06d2afd253e0ca0aabfe2
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-danish-3.1.20-27.alpha.rpm

1a9af73a5e65d8d2b3b57f09cd35e4a7
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-dicts-3.1.20-27.alpha.rpm

95521dab5d74e52be7f8833b33ccb8bb
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-dutch-3.1.20-27.alpha.rpm

c33e52eb93308ac562af0bc8e53823c3
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-esperanto-3.1.20-27.alpha.rpm

d39607b341503feefe85a906f3bea7cf
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-french-3.1.20-27.alpha.rpm

bbc178a58b187882a6f3667d94cfd017
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-german-3.1.20-27.alpha.rpm

96f16fd6bde60b0ab0c7d0a5e1349bbe
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-greek-3.1.20-27.alpha.rpm

398b9779cf934a3ab239f04366c3e89d
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-italian-3.1.20-27.alpha.rpm

e5a12f36b8798c8d3712096fc11a225d
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-norwegian-3.1.20-27.alpha.rpm

ec1e5b9887dee0f1b297d9b3509ea726
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-polish-3.1.20-27.alpha.rpm

d3056b54a04e4fd89b705e157bb41322
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-portuguese-3.1.20-27.alpha.rpm

e6ce09aed82b99ea4c39dc28f38b60a2
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-russian-3.1.20-27.alpha.rpm

8e37c904a358785754f90bf1bba3682a
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-spanish-3.1.20-27.alpha.rpm

9cdfef72a057d45592e6f8a1ee1e92bc
ftp://updates.redhat.com/6.2/en/os/alpha/ispell-swedish-3.1.20-27.alpha.rpm

d044fb42d87d6d6a584c7b4b8076e870
ftp://updates.redhat.com/6.2/en/os/i386/ispell-3.1.20-27.i386.rpm

2b42a57b0b7fce52267f51a883caa1ae
ftp://updates.redhat.com/6.2/en/os/i386/ispell-catalan-3.1.20-27.i386.rpm

e52f616a3995c1af99c3e09a078d6bfe
ftp://updates.redhat.com/6.2/en/os/i386/ispell-czech-3.1.20-27.i386.rpm

d85cf08f939d24bdf492f11f0f6f2c1d
ftp://updates.redhat.com/6.2/en/os/i386/ispell-danish-3.1.20-27.i386.rpm

bc7942c5122acd9fb6b27fe437110b76
ftp://updates.redhat.com/6.2/en/os/i386/ispell-dicts-3.1.20-27.i386.rpm

5b4af1d981c13ba828b925194eec87a5
ftp://updates.redhat.com/6.2/en/os/i386/ispell-dutch-3.1.20-27.i386.rpm

b925968cce19d612266c2df963979078
ftp://updates.redhat.com/6.2/en/os/i386/ispell-esperanto-3.1.20-27.i386.rpm

95430e9519931d16f3632e164ebf4e2d
ftp://updates.redhat.com/6.2/en/os/i386/ispell-french-3.1.20-27.i386.rpm

58cc680b5dd29dc82f50dd7e99c3fb29
ftp://updates.redhat.com/6.2/en/os/i386/ispell-german-3.1.20-27.i386.rpm

637822c0a0e516c89d23e2232793e6ce
ftp://updates.redhat.com/6.2/en/os/i386/ispell-greek-3.1.20-27.i386.rpm

c3d9b815b3319d8231477cf34064b81a
ftp://updates.redhat.com/6.2/en/os/i386/ispell-italian-3.1.20-27.i386.rpm

9c98608d1c98c03a208614c550a56f46
ftp://updates.redhat.com/6.2/en/os/i386/ispell-norwegian-3.1.20-27.i386.rpm

e8953283f2e106d524afdc00649a6f1a
ftp://updates.redhat.com/6.2/en/os/i386/ispell-polish-3.1.20-27.i386.rpm

e282fa1392b7c6f5bf7278a11acf2415
ftp://updates.redhat.com/6.2/en/os/i386/ispell-portuguese-3.1.20-27.i386.rpm

05fafd41cda8c9aef1fb5468f45e621e
ftp://updates.redhat.com/6.2/en/os/i386/ispell-russian-3.1.20-27.i386.rpm

ffebf96f2cd03f2dee759dcf7e752c21
ftp://updates.redhat.com/6.2/en/os/i386/ispell-spanish-3.1.20-27.i386.rpm

ca954dec303d267078b3c7dabc2c7566
ftp://updates.redhat.com/6.2/en/os/i386/ispell-swedish-3.1.20-27.i386.rpm

c48b20386293f86859c90c04866f48f4
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-3.1.20-27.sparc.rpm

cc00880a4b591f99a4e7a379360374e4
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-catalan-3.1.20-27.sparc.rpm

dd67010bf33a0c5af282a2c02a76d710
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-czech-3.1.20-27.sparc.rpm

923999cb6d7c37ddf980972832b7e222
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-danish-3.1.20-27.sparc.rpm

772d32d11339c1ca5f86a4ece08bb970
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-dicts-3.1.20-27.sparc.rpm

33ee05db155b1b30582a9dce2d6f5789
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-dutch-3.1.20-27.sparc.rpm

5f53966976d5f267c417fe991fdad947
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-esperanto-3.1.20-27.sparc.rpm

2e99d25a2bd125540f22815f90a9dfcd
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-french-3.1.20-27.sparc.rpm

d85dbeb892461378b2e6b0728a979b2f
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-german-3.1.20-27.sparc.rpm

429265541b9d9dd96880709178f7b38c
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-greek-3.1.20-27.sparc.rpm

305d6ada4f624037e86ef4dfea6c51ae
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-italian-3.1.20-27.sparc.rpm

cf5bc6a8404f1f23c0d130f2f6a63b20
ftp://updates.redhat.com/6.2/en/os/sparc/ispell-norwegian-3.1.20-27.sparc.rpm