dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Advisories, October 5, 2006

Oct 06, 2006, 03:45 (0 Talkback[s])

Debian GNU/Linux


Debian Security Advisory DSA 1191-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 5th, 2006 http://www.debian.org/security/faq


Package : mozilla-thunderbird
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566 CVE-2006-4568 CVE-2006-4570 CVE-2006-4571
BugTraq ID : 20042

Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

CVE-2006-2788

Fernando Ribeiro discovered that a vulnerability in the getRawDER functionallows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code.

CVE-2006-4340

Daniel Bleichenbacher recently described an implementation error in RSA signature verification that cause the application to incorrectly trust SSL certificates.

CVE-2006-4565, CVE-2006-4566

Priit Laes reported that that a JavaScript regular expression can trigger a heap-based buffer overflow which allows remote attackers to cause a denial of service and possibly execute arbitrary code.

CVE-2006-4568

A vulnerability has been discovered that allows remote attackers to bypass the security model and inject content into the sub-frame of another site.

CVE-2006-4570

Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded.

CVE-2006-4571

Multiple unspecified vulnerabilities in Firefox, Thunderbird and SeaMonkey allow remote attackers to cause a denial of service, corrupt memory, and possibly execute arbitrary code.

For the stable distribution (sarge) these problems have been fixed in version 1.0.2-2.sarge1.0.8c.1.

For the unstable distribution (sid) these problems have been fixed in version 1.5.0.7-1.

We recommend that you upgrade your Mozilla Thunderbird packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.dsc
      Size/MD5 checksum: 1003 d7261fba347b9876e873f1d424e60190
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz
      Size/MD5 checksum: 519315 066ed351050722c36274e3e837fd174f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz
      Size/MD5 checksum: 33288906 806175393a226670aa66060452d31df4

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_alpha.deb
      Size/MD5 checksum: 12855288 285e55a20445ea5dffe79de01baf788c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb
      Size/MD5 checksum: 3280106 0206d9fe08e3da2d4bf919c6b2b54ec7
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb
      Size/MD5 checksum: 152092 c5c984f0f11f94cb263f5bbef367de09
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb
      Size/MD5 checksum: 33520 ed7e6d825f630da666e07914527f2c75
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb
      Size/MD5 checksum: 89492 1e9ed565915dc4327e444ad999cc5daa

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_amd64.deb
      Size/MD5 checksum: 12258904 f40f86252184ce7360b2b9d1e58cef8f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_amd64.deb
      Size/MD5 checksum: 3281164 e4e2160d22d4721508f1762804b3b18b
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_amd64.deb
      Size/MD5 checksum: 151124 a72d17f827929c9189f9ba96ff73c7a1
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_amd64.deb
      Size/MD5 checksum: 33512 bbe0fe4a7e56a138c220790ab9de97a6
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_amd64.deb
      Size/MD5 checksum: 89350 f2b7e1d1d4eb5f1abb2522ddbdb46ff5

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_arm.deb
      Size/MD5 checksum: 10345146 4c171699433072d443eb7b35a2550fd2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb
      Size/MD5 checksum: 3272118 a52ad3d2cd1806e936374537e135d7db
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb
      Size/MD5 checksum: 143266 9dedbe9b5f45727a93cfccb5c99bf371
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb
      Size/MD5 checksum: 33522 14d1c0d0af46731075ea7c35c2900258
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb
      Size/MD5 checksum: 81318 81219b4c82896fab12427e42df1b2760

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_hppa.deb
      Size/MD5 checksum: 13570024 3a62ee11075402dfad030e2ede937191
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb
      Size/MD5 checksum: 3285124 e9cadee2d32b2bcb56b1278043e97da4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb
      Size/MD5 checksum: 153296 3fecaa707002afb1ba6854da724ad132
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb
      Size/MD5 checksum: 33520 83e537b9aff4d44fd958043298a1d7f2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb
      Size/MD5 checksum: 97390 c3ceeedcf00d99d34c7b5f424da7da63

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_i386.deb
      Size/MD5 checksum: 11568436 af1de65bd715970c4432149aec80b2a2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb
      Size/MD5 checksum: 3507870 5dab89db24f1443fe782dc931f4ee0af
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb
      Size/MD5 checksum: 146732 bc52082cd1ab0f026c401204cd63b4a7
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb
      Size/MD5 checksum: 33518 5d3c9700cce7b9c0261c246ed7b8afd4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb
      Size/MD5 checksum: 88084 e244c9c8b7224814774bef13f4213d4e

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_ia64.deb
      Size/MD5 checksum: 14628630 07bfcc171f449b86b9d62f903e29d506
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb
      Size/MD5 checksum: 3291260 d7186841974796f8f90be26700801a95
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb
      Size/MD5 checksum: 155452 e17eb664e56fcc0809dd36580f92cc1a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb
      Size/MD5 checksum: 33514 fc890529fdea5526a05ffd16b96f5956
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb
      Size/MD5 checksum: 107220 eb93528d586b050ecc3b60742b4fa344

Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_m68k.deb
      Size/MD5 checksum: 10794842 fa716b92e3c7a9d67fad6fd453c78bb4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb
      Size/MD5 checksum: 3271690 d95eb910dd6d38de41c17fcb6b1c4696
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb
      Size/MD5 checksum: 145054 2b7570676e15cea809905c442f91b5e0
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb
      Size/MD5 checksum: 33550 3db6c520d1c489fb4e17501d19dececf
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb
      Size/MD5 checksum: 82556 32d25c11844a48ed963e3c5c51ff34fc

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mips.deb
      Size/MD5 checksum: 11948708 4f58ce9668da6a12b823edaa3c8b35b3
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb
      Size/MD5 checksum: 3279410 e639b2bf43eda95d3ca3bb0b9aec6df7
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb
      Size/MD5 checksum: 148042 cb6ee4a9bd4dec3166e48e356b9c3465
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb
      Size/MD5 checksum: 33524 2765555b00f4ed717b34e98c5c0d9c02
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb
      Size/MD5 checksum: 84748 0e934e90bb6bd47c7500fd665728ba27

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_mipsel.deb
      Size/MD5 checksum: 11817078 4239077894c74444d33063229dd847df
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb
      Size/MD5 checksum: 3280416 ac165850436e63818da8fffe134628d1
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb
      Size/MD5 checksum: 147600 ae6d7ff1b34dddab3d0c18d6e38bc77b
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb
      Size/MD5 checksum: 33518 27bed1b95a4e34a291c7e67c6a9fdd37
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb
      Size/MD5 checksum: 84650 173fefc8b58b15398b3cccad2c812495

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_powerpc.deb
      Size/MD5 checksum: 10912494 d13ec5b97f5fde0795e5f762330756f6
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb
      Size/MD5 checksum: 3270108 dbd7eb3154db4a379fcfcda6b7d414b9
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb
      Size/MD5 checksum: 145048 b9ab45845f58fb064d7d1ae449481db9
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb
      Size/MD5 checksum: 33526 b5e07e26d215581b4cc0fea6d71beaf3
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb
      Size/MD5 checksum: 81478 b57b8038afbfd5490a6cf847e740ab60

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_s390.deb
      Size/MD5 checksum: 12705708 68195861caccd07a18a379ffe2e88403
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb
      Size/MD5 checksum: 3280614 38dec996622a4e1762a1ef683bba9c43
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb
      Size/MD5 checksum: 151436 b54ba7420653e63746d019b979f3ae76
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb
      Size/MD5 checksum: 33516 e24dafe27c103a8d40de9a905b052311
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb
      Size/MD5 checksum: 89290 9daa1eb634834e02aefde0a594bcd0f9

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1_sparc.deb
      Size/MD5 checksum: 11181284 adedd4c6302ddb868a531810d226143a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb
      Size/MD5 checksum: 3275816 c38922ec47674939277e6984f87c0eb4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb
      Size/MD5 checksum: 144702 9183a627463aa564a0313d4d361d22f3
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb
      Size/MD5 checksum: 33528 5f87736faa9ee0a9b10e29c48280798a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb
      Size/MD5 checksum: 83122 72966880dc02a1b472dcac7b1404fa58

These files will probably be moved into the stable distribution on its next update.


For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: php security update
Advisory ID: RHSA-2006:0688-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0688.html
Issue date: 2006-10-05
Updated on: 2006-10-05
Product: Red Hat Application Stack
CVE Names: CVE-2006-4020 CVE-2006-4482 CVE-2006-4484 CVE-2006-4485 CVE-2006-4486 CVE-2006-4812


1. Summary:

Updated PHP packages that fix multiple security issues are now available for the Red Hat Application Stack.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Application Stack v1 for Enterprise Linux AS (v.4) - i386, x86_64
Red Hat Application Stack v1 for Enterprise Linux ES (v.4) - i386, x86_64

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.

An integer overflow was discovered in the PHP memory handling routines. If a script can cause memory allocation based on untrusted user data, a remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user. (CVE-2006-4812)

A buffer overflow was discovered in the PHP sscanf() function. If a script used the sscanf() function with positional arguments in the format string, a remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user. (CVE-2006-4020)

An integer overflow was discovered in the PHP wordwrap() and str_repeat() functions. If a script running on a 64-bit server used either of these functions on untrusted user data, a remote attacker sending a carefully crafted request might be able to cause a heap overflow. (CVE-2006-4482)

A buffer overflow was discovered in the PHP gd extension. If a script was set up to process GIF images from untrusted sources using the gd extension, a remote attacker could cause a heap overflow. (CVE-2006-4484)

A buffer overread was discovered in the PHP stripos() function. If a script used the stripos() function with untrusted user data, PHP may read past the end of a buffer, which could allow a denial of service attack by a remote user. (CVE-2006-4485)

An integer overflow was discovered in the PHP memory allocation handling. On 64-bit platforms, the "memory_limit" setting was not enforced correctly, which could allow a denial of service attack by a remote user. (CVE-2006-4486)

These packages also contain a fix for a bug where certain input strings to the metaphone() function could cause memory corruption.

Users of PHP should upgrade to these updated packages, which contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

207090 - CVE-2006-4020 PHP security issues (CVE-2006-4482 CVE-2006-4484 CVE-2006-4485 CVE-2006-4486)
209408 - CVE-2006-4812 PHP ecalloc integer overflow

6. RPMs required:

Red Hat Application Stack v1 for Enterprise Linux AS (v.4):

SRPMS:
ftp://updates.redhat.com/4AS-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.4.src.rpm
8450536ffd216fffd7a2c350ef2d8122 php-5.1.4-1.el4s1.4.src.rpm

i386:
d8504a875caf435ac3d87be51da23cbb php-5.1.4-1.el4s1.4.i386.rpm
0b093ab3604f91f031e77fc374851333
php-bcmath-5.1.4-1.el4s1.4.i386.rpm
be94330943e42d6ce9795ac1aa005c5c php-dba-5.1.4-1.el4s1.4.i386.rpm
6a69ac6b8f30363beb5eb774ae8a7582
php-debuginfo-5.1.4-1.el4s1.4.i386.rpm
89e204920cedc8129dca821268de2fdb php-devel-5.1.4-1.el4s1.4.i386.rpm
9404807f4baab567cebf50e00dc0328c
php-gd-5.1.4-1.el4s1.4.i386.rpm
c08f52b6d7dbb729e09f4b95f89562b1 php-imap-5.1.4-1.el4s1.4.i386.rpm
9944e216a9b9d6b06a73d620e2d5a26e
php-ldap-5.1.4-1.el4s1.4.i386.rpm
399033da724e5d135fbd4c5bea8641a3 php-mbstring-5.1.4-1.el4s1.4.i386.rpm
8cdb68afa789a1744f9c0cc4cb25f680
php-mysql-5.1.4-1.el4s1.4.i386.rpm
80b3a6b0e0b029255fea1ae1b892b3a8 php-ncurses-5.1.4-1.el4s1.4.i386.rpm
67fe4b574af94f99e22042e0b1b0617d
php-odbc-5.1.4-1.el4s1.4.i386.rpm
f3794d4b2cc0c41efb3029efea456129 php-pdo-5.1.4-1.el4s1.4.i386.rpm
ff9b98642ebf3726ab189b8b07c78cf4
php-pgsql-5.1.4-1.el4s1.4.i386.rpm
42144bb23cfba2f20967d280f6bc4087 php-snmp-5.1.4-1.el4s1.4.i386.rpm
dfe2fdeecd4fc439bad8c05e2abdefac
php-soap-5.1.4-1.el4s1.4.i386.rpm
877b079373e5d1809d7c4e092b04c12a php-xml-5.1.4-1.el4s1.4.i386.rpm
b2a43cb90b877484085c562d931daa06
php-xmlrpc-5.1.4-1.el4s1.4.i386.rpm

x86_64:
21e04b311dc5f7b9bef079dc1dbdd01a php-5.1.4-1.el4s1.4.x86_64.rpm
372a46e2847f69de0b14ca16cb43eaf3
php-bcmath-5.1.4-1.el4s1.4.x86_64.rpm
23531793db020c866ebe475fcddf750d php-dba-5.1.4-1.el4s1.4.x86_64.rpm
5327f3805a18b235140ba91ece545400
php-debuginfo-5.1.4-1.el4s1.4.x86_64.rpm
db2a441639cae736640e13ab7cbe133a php-devel-5.1.4-1.el4s1.4.x86_64.rpm
1634a9dc26e120084a6fe49262e0f0e0
php-gd-5.1.4-1.el4s1.4.x86_64.rpm
45becd8779a8da71b139b1ba3ee9400e php-imap-5.1.4-1.el4s1.4.x86_64.rpm
3b2ef5dede854065651495602fa6c126
php-ldap-5.1.4-1.el4s1.4.x86_64.rpm
5d27f29c72f624c1a868f3cdbefd0b77 php-mbstring-5.1.4-1.el4s1.4.x86_64.rpm
edaafb7eca7e3c41acbf69259c525d14
php-mysql-5.1.4-1.el4s1.4.x86_64.rpm
c15c8d27058ad09b838a53b4f4c81b6e php-ncurses-5.1.4-1.el4s1.4.x86_64.rpm
d888187eb18ffa7f46550138d84700fa
php-odbc-5.1.4-1.el4s1.4.x86_64.rpm
6d5d2387c96663442bf90b9a2cb45253 php-pdo-5.1.4-1.el4s1.4.x86_64.rpm
c68935c8f98ea97fc468c173c6d36509
php-pgsql-5.1.4-1.el4s1.4.x86_64.rpm
a7ac3a5427b16926fae2e91f347ea585 php-snmp-5.1.4-1.el4s1.4.x86_64.rpm
8143af224065383c5518c5f0b8764fb2
php-soap-5.1.4-1.el4s1.4.x86_64.rpm
1255ae1a27002b314951340ef15d886f php-xml-5.1.4-1.el4s1.4.x86_64.rpm
19d384ad3ccaf7fa73c21ffa7ff012c8
php-xmlrpc-5.1.4-1.el4s1.4.x86_64.rpm

Red Hat Application Stack v1 for Enterprise Linux ES (v.4):

SRPMS:
ftp://updates.redhat.com/4ES-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.4.src.rpm
8450536ffd216fffd7a2c350ef2d8122 php-5.1.4-1.el4s1.4.src.rpm

i386:
d8504a875caf435ac3d87be51da23cbb php-5.1.4-1.el4s1.4.i386.rpm
0b093ab3604f91f031e77fc374851333
php-bcmath-5.1.4-1.el4s1.4.i386.rpm
be94330943e42d6ce9795ac1aa005c5c php-dba-5.1.4-1.el4s1.4.i386.rpm
6a69ac6b8f30363beb5eb774ae8a7582
php-debuginfo-5.1.4-1.el4s1.4.i386.rpm
89e204920cedc8129dca821268de2fdb php-devel-5.1.4-1.el4s1.4.i386.rpm
9404807f4baab567cebf50e00dc0328c
php-gd-5.1.4-1.el4s1.4.i386.rpm
c08f52b6d7dbb729e09f4b95f89562b1 php-imap-5.1.4-1.el4s1.4.i386.rpm
9944e216a9b9d6b06a73d620e2d5a26e
php-ldap-5.1.4-1.el4s1.4.i386.rpm
399033da724e5d135fbd4c5bea8641a3 php-mbstring-5.1.4-1.el4s1.4.i386.rpm
8cdb68afa789a1744f9c0cc4cb25f680
php-mysql-5.1.4-1.el4s1.4.i386.rpm
80b3a6b0e0b029255fea1ae1b892b3a8 php-ncurses-5.1.4-1.el4s1.4.i386.rpm
67fe4b574af94f99e22042e0b1b0617d
php-odbc-5.1.4-1.el4s1.4.i386.rpm
f3794d4b2cc0c41efb3029efea456129 php-pdo-5.1.4-1.el4s1.4.i386.rpm
ff9b98642ebf3726ab189b8b07c78cf4
php-pgsql-5.1.4-1.el4s1.4.i386.rpm
42144bb23cfba2f20967d280f6bc4087 php-snmp-5.1.4-1.el4s1.4.i386.rpm
dfe2fdeecd4fc439bad8c05e2abdefac
php-soap-5.1.4-1.el4s1.4.i386.rpm
877b079373e5d1809d7c4e092b04c12a php-xml-5.1.4-1.el4s1.4.i386.rpm
b2a43cb90b877484085c562d931daa06
php-xmlrpc-5.1.4-1.el4s1.4.i386.rpm

x86_64:
21e04b311dc5f7b9bef079dc1dbdd01a php-5.1.4-1.el4s1.4.x86_64.rpm
372a46e2847f69de0b14ca16cb43eaf3
php-bcmath-5.1.4-1.el4s1.4.x86_64.rpm
23531793db020c866ebe475fcddf750d php-dba-5.1.4-1.el4s1.4.x86_64.rpm
5327f3805a18b235140ba91ece545400
php-debuginfo-5.1.4-1.el4s1.4.x86_64.rpm
db2a441639cae736640e13ab7cbe133a php-devel-5.1.4-1.el4s1.4.x86_64.rpm
1634a9dc26e120084a6fe49262e0f0e0
php-gd-5.1.4-1.el4s1.4.x86_64.rpm
45becd8779a8da71b139b1ba3ee9400e php-imap-5.1.4-1.el4s1.4.x86_64.rpm
3b2ef5dede854065651495602fa6c126
php-ldap-5.1.4-1.el4s1.4.x86_64.rpm
5d27f29c72f624c1a868f3cdbefd0b77 php-mbstring-5.1.4-1.el4s1.4.x86_64.rpm
edaafb7eca7e3c41acbf69259c525d14
php-mysql-5.1.4-1.el4s1.4.x86_64.rpm
c15c8d27058ad09b838a53b4f4c81b6e php-ncurses-5.1.4-1.el4s1.4.x86_64.rpm
d888187eb18ffa7f46550138d84700fa
php-odbc-5.1.4-1.el4s1.4.x86_64.rpm
6d5d2387c96663442bf90b9a2cb45253 php-pdo-5.1.4-1.el4s1.4.x86_64.rpm
c68935c8f98ea97fc468c173c6d36509
php-pgsql-5.1.4-1.el4s1.4.x86_64.rpm
a7ac3a5427b16926fae2e91f347ea585 php-snmp-5.1.4-1.el4s1.4.x86_64.rpm
8143af224065383c5518c5f0b8764fb2
php-soap-5.1.4-1.el4s1.4.x86_64.rpm
1255ae1a27002b314951340ef15d886f php-xml-5.1.4-1.el4s1.4.x86_64.rpm
19d384ad3ccaf7fa73c21ffa7ff012c8
php-xmlrpc-5.1.4-1.el4s1.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Important: kernel security update
Advisory ID: RHSA-2006:0689-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0689.html
Issue date: 2006-10-05
Updated on: 2006-10-05
Product: Red Hat Enterprise Linux
Keywords: nahant kernel update
Obsoletes: RHSA-2006:0617
CVE Names: CVE-2005-4811 CVE-2006-0039 CVE-2006-2071 CVE-2006-3741 CVE-2006-4093 CVE-2006-4535 CVE-2006-4623 CVE-2006-4997


1. Summary:

Updated kernel packages that fix several security issues in the Red Hat Enterprise Linux 4 kernel are now available.

This security advisory has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described below:

  • a flaw in the SCTP support that allowed a local user to cause a denial of service (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)
  • a flaw in the hugepage table support that allowed a local user to cause a denial of service (crash). (CVE-2005-4811, Important)
  • a flaw in the mprotect system call that allowed setting write permission for a read-only attachment of shared memory. (CVE-2006-2071, Moderate)
  • a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems that allowed a local user to cause a denial of service. (crash) (CVE-2006-4093, Moderate)
  • a flaw in the perfmon support of Itanium systems that allowed a local user to cause a denial of service by consuming all file descriptors. (CVE-2006-3741, Moderate)
  • a flaw in the ATM subsystem. On systems with installed ATM hardware and configured ATM support, a remote user could cause a denial of service (panic) by accessing socket buffers memory after freeing them. (CVE-2006-4997, Moderate)
  • a flaw in the DVB subsystem. On systems with installed DVB hardware and configured DVB support, a remote user could cause a denial of service (panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)
  • an information leak in the network subsystem that possibly allowed a local user to read sensitive data from kernel memory. (CVE-2006-0039, Low)

In addition, two bugfixes for the IPW-2200 wireless driver were included. The first one ensures that wireless management applications correctly identify IPW-2200 controlled devices, while the second fix ensures that DHCP requests using the IPW-2200 operate correctly.

Red Hat would like to thank Olof Johansson, Stephane Eranian and Solar Designer for reporting issues fixed in this erratum.

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

165345 - CVE-2005-4811 Hugepage crash on failing mmap()
190073 - CVE-2006-2071 mprotect gives write permission to a readonly attachment
191698 - CVE-2006-0039 netfilter do_add_counters race
198820 - IPW2200 /proc/net/wireless file fields are empty
201684 - CVE-2006-4093 Local DoS through uncleared HID0[31]
203421 - Grabbing DHCP address via wireless not always successful
204360 - CVE-2006-3741 sys_perfmonctl() file descriptor reference count issue
204460 - CVE-2006-4535 Regression with fix for SCTP abort issue
204912 - CVE-2006-4623 Wrong handling of DVB ULE SNDU with length of 0
206265 - CVE-2006-4997 IP over ATM clip_mkip dereference freed pointer

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78 kernel-2.6.9-42.0.3.EL.src.rpm

i386:
97c7b0d569b80ea7a86ad7181655b394 kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07 kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51 kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm

ia64:
f059a2e3b41e897b513913dab047bdfe kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06 kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm

ppc:
6baa19f3ae93e40964d2135d7a80065f kernel-2.6.9-42.0.3.EL.ppc64.rpm
6037e7111ab58581b876d3b73b5f108d
kernel-2.6.9-42.0.3.EL.ppc64iseries.rpm
d6dcd6b280380d5c5081dcd049fef1d1 kernel-debuginfo-2.6.9-42.0.3.EL.ppc64.rpm
859239f1d7f0f1dfca757484f9e6862a
kernel-debuginfo-2.6.9-42.0.3.EL.ppc64iseries.rpm
2a368faf439a27e41ee5ad12f7dc5379 kernel-devel-2.6.9-42.0.3.EL.ppc64.rpm
92b5cf3acf2659eadb313c73bf0624b1
kernel-devel-2.6.9-42.0.3.EL.ppc64iseries.rpm
956dfa20406d710f2925191beb35b60e kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
1407d3d79e6f458de7c472f366d131f5
kernel-largesmp-2.6.9-42.0.3.EL.ppc64.rpm
86e0a6e1a3ba621a69eacea525c8421d kernel-largesmp-devel-2.6.9-42.0.3.EL.ppc64.rpm

s390:
43411689ca8b3299a050eaacb5ccc6c4 kernel-2.6.9-42.0.3.EL.s390.rpm
8452548f0b60e38dab481598b2700e93
kernel-debuginfo-2.6.9-42.0.3.EL.s390.rpm
587ef66883f9b699dbc774507c605548 kernel-devel-2.6.9-42.0.3.EL.s390.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm

s390x:
a1b4a15fe3273edc6604e7a5472b96bd kernel-2.6.9-42.0.3.EL.s390x.rpm
b048694685cbfa12297f3e02fa2d6fc3
kernel-debuginfo-2.6.9-42.0.3.EL.s390x.rpm
72fca784b40da07865a38c474b320a11 kernel-devel-2.6.9-42.0.3.EL.s390x.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm

x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7 kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180 kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5 kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78 kernel-2.6.9-42.0.3.EL.src.rpm

i386:
97c7b0d569b80ea7a86ad7181655b394 kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07 kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51 kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm

x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7 kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180 kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5 kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78 kernel-2.6.9-42.0.3.EL.src.rpm

i386:
97c7b0d569b80ea7a86ad7181655b394 kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07 kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51 kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm

ia64:
f059a2e3b41e897b513913dab047bdfe kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06 kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm

x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7 kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180 kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5 kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78 kernel-2.6.9-42.0.3.EL.src.rpm

i386:
97c7b0d569b80ea7a86ad7181655b394 kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07 kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51 kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm

ia64:
f059a2e3b41e897b513913dab047bdfe kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06 kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm

x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7 kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm