dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Advisories: February 19, 2007

Feb 20, 2007, 05:30 (0 Talkback[s])

Gentoo Linux


Gentoo Linux Security Advisory GLSA 200702-06

http://security.gentoo.org/


Severity: Normal
Title: BIND: Denial of Service
Date: February 17, 2007
Bugs: #163692
ID: 200702-06


Synopsis

ISC BIND contains two vulnerabilities allowing a Denial of Service under certain conditions.

Background

ISC BIND is the Internet Systems Consortium implementation of the Domain Name System (DNS) protocol.

Affected packages


     Package       /  Vulnerable  /                         Unaffected


1 net-dns/bind < 9.3.4 >= 9.3.4 *>= 9.2.8

Description

An unspecified improper usage of an already freed context has been reported. Additionally, an assertion error could be triggered in the DNSSEC validation of some responses to type ANY queries with multiple RRsets.

Impact

A remote attacker could crash the server through unspecified vectors or, if DNSSEC validation is enabled, by sending certain crafted ANY queries.

Workaround

There is no known workaround at this time for the first issue. The DNSSEC validation Denial of Service can be prevented by disabling DNSSEC validation until the upgrade to a fixed version. Note that DNSSEC validation is disabled on a default configuration.

Resolution

All ISC BIND 9.3 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.4"

All ISC BIND 9.2 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.8"

References

[ 1 ] CVE-2007-0493

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0493

[ 2 ] CVE-2007-0494

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2007-0494

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-06.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200702-07

http://security.gentoo.org/


Severity: Normal
Title: Sun JDK/JRE: Execution of arbitrary code
Date: February 17, 2007
Bugs: #162511
ID: 200702-07


Synopsis

Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) contain a memory corruption flaw that allows the applets to gain elevated privileges potentially leading to the execute of arbitrary code.

Background

The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform.

Affected packages


     Package               /  Vulnerable  /                 Unaffected


1 dev-java/sun-jdk < 1.5.0.10 >= 1.5.0.10 *>= 1.4.2.13 dev-java/sun-jdk < 1.4.2.13 >= 1.5.0.10 *>= 1.4.2.13 2 dev-java/sun-jre-bin < 1.5.0.10 >= 1.5.0.10 *>= 1.4.2.13 dev-java/sun-jre-bin < 1.4.2.13 >= 1.5.0.10 *>= 1.4.2.13 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures.

Description

A anonymous researcher discovered that an error in the handling of a GIF image with a zero width field block leads to a memory corruption flaw.

Impact

An attacker could entice a user to run a specially crafted Java applet or application that would load a crafted GIF image, which could result in escalation of privileges and unauthorized access to system resources.

Workaround

There is no known workaround at this time.

Resolution

All Sun Java Development Kit 1.5 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"

All Sun Java Development Kit 1.4 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"

All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"

All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*"

References

[ 1 ] CVE-2007-0243

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2007-0243

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-07.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


Gentoo Linux Security Advisory GLSA 200702-08

http://security.gentoo.org/


Severity: Normal
Title: AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities
Date: February 17, 2007
Bugs: #159547
ID: 200702-08


Synopsis

Multiple unspecified vulnerabilities have been identified in Sun Java Development Kit (JDK) and Sun Java Runtime Environment (JRE).

Background

The Sun Java Development Kit (JDK) and the Sun Java Runtime Environment (JRE) provide the Sun Java platform. The x86 emulation Sun's J2SE Development Kit for AMD64 contains a vulnerable version of Sun's JDK.

Affected packages


     Package                            /  Vulnerable  /    Unaffected

  1  app-emulation/emul-linux-x86-java     < 1.5.0.10      >= 1.5.0.10

     # Package 1 only applies to AMD64 users.

Description

Chris Evans has discovered multiple buffer overflows in Sun JDK and Sun JRE possibly related to various AWT or font layout functions. Tom Hawtin has discovered an unspecified vulnerability in Sun JDK and Sun JRE relating to unintended applet data access. He has also discovered multiple other unspecified vulnerabilities in Sun JDK and Sun JRE allowing unintended Java applet or application resource acquisition. Additionally, a memory corruption error has been found in the handling of GIF images with zero width field blocks.

Impact

An attacker could entice a user to run a specially crafted Java applet or application that could read, write, or execute local files with the privileges of the user running the JVM, access data maintained in other Java applets, or escalate the privileges of the currently running Java applet or application allowing for unauthorized access to system resources.

Workaround

There is no known workaround at this time.

Resolution

All AMD64 x86 emulation Sun's J2SE Development Kit users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.10"

References

[ 1 ] CVE-2006-6731

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731

[ 2 ] CVE-2006-6736

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736

[ 3 ] CVE-2006-6737

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737

[ 4 ] CVE-2006-6745

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745

[ 5 ] CVE-2007-0243

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200702-08.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2007:043
http://www.mandriva.com/security/


Package : clamav
Date : February 19, 2007
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0


Problem Description:

Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor. (CVE-2007-0897)

Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message. (CVE-2007-0898)

The update to 0.90 addresses these issues.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898


Updated Packages:

Mandriva Linux 2006.0:
d478e8184aac28373be2bd287cbeae73 2006.0/i586/clamav-0.90-0.1.20060mdk.i586.rpm
fd08410e04bfac99c4ebb3423f8a212f 2006.0/i586/clamav-db-0.90-0.1.20060mdk.i586.rpm
26e74832cb99e2284f06debabea7a163 2006.0/i586/clamav-milter-0.90-0.1.20060mdk.i586.rpm
49c12cdd69b9ff06f2c3f382ef9424f5 2006.0/i586/clamd-0.90-0.1.20060mdk.i586.rpm
e8671b979de6801bf6a9f88f2f514aa3 2006.0/i586/libclamav1-0.90-0.1.20060mdk.i586.rpm
484447c8ce4d5d0a38940df71ac181fc 2006.0/i586/libclamav1-devel-0.90-0.1.20060mdk.i586.rpm
73b2ff74a1eab49ecc30e8f4fb247bf2 2006.0/SRPMS/clamav-0.90-0.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
d0358166c006dc52593c58a00335ede6 2006.0/x86_64/clamav-0.90-0.1.20060mdk.x86_64.rpm
b7b96b59800f61f9772c8ff5d2c1e174 2006.0/x86_64/clamav-db-0.90-0.1.20060mdk.x86_64.rpm
c0c59ceed196d27d9f6cf957197c82c5 2006.0/x86_64/clamav-milter-0.90-0.1.20060mdk.x86_64.rpm
212ca37f1506c9283a7a47a94b05761c 2006.0/x86_64/clamd-0.90-0.1.20060mdk.x86_64.rpm
0e807be53a70992133fffcace4ecaba9 2006.0/x86_64/lib64clamav1-0.90-0.1.20060mdk.x86_64.rpm
ebd04ff90f10621837c1fcddb357293c 2006.0/x86_64/lib64clamav1-devel-0.90-0.1.20060mdk.x86_64.rpm
73b2ff74a1eab49ecc30e8f4fb247bf2 2006.0/SRPMS/clamav-0.90-0.1.20060mdk.src.rpm

Mandriva Linux 2007.0:
05b57b655873d037cd93ecef3f439e4a 2007.0/i586/clamav-0.90-1.1mdv2007.0.i586.rpm
4c894ca77de3bb764bf001df5fe456d0 2007.0/i586/clamav-db-0.90-1.1mdv2007.0.i586.rpm
a79763ed46f52df012cda91ae15c24bc 2007.0/i586/clamav-milter-0.90-1.1mdv2007.0.i586.rpm
ac617c55ee7fc187bb763b4f422b45f4 2007.0/i586/clamd-0.90-1.1mdv2007.0.i586.rpm
1f560e10b9f5263a406b5682f8df20b3 2007.0/i586/libclamav1-0.90-1.1mdv2007.0.i586.rpm
83492cb6e36b01f82c3772270af81d71 2007.0/i586/libclamav1-devel-0.90-1.1mdv2007.0.i586.rpm
e14099005151cb6cd06527348ea9f5f2 2007.0/SRPMS/clamav-0.90-1.1mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
833fa03ec7207b9908c0b3fca554dd49 2007.0/x86_64/clamav-0.90-1.1mdv2007.0.x86_64.rpm
29909e2d73531f75750c02c025f91dcb 2007.0/x86_64/clamav-db-0.90-1.1mdv2007.0.x86_64.rpm
2527cf8b432dc7b5ad6ba3fd427724bd 2007.0/x86_64/clamav-milter-0.90-1.1mdv2007.0.x86_64.rpm
fc2b6a8a934e88d93debdd644f4eefef 2007.0/x86_64/clamd-0.90-1.1mdv2007.0.x86_64.rpm
ee89752f5b5875e5ac5afd7ad4293b32 2007.0/x86_64/lib64clamav1-0.90-1.1mdv2007.0.x86_64.rpm
81d17f067619437526190b953e0c5206 2007.0/x86_64/lib64clamav1-devel-0.90-1.1mdv2007.0.x86_64.rpm
e14099005151cb6cd06527348ea9f5f2 2007.0/SRPMS/clamav-0.90-1.1mdv2007.0.src.rpm

Corporate 3.0:
ad2dff0bec17856884d0ccecc18df652 corporate/3.0/i586/clamav-0.90-0.1.C30mdk.i586.rpm
cb9cca92b34fb2e6e5709f4d9b3de0ad corporate/3.0/i586/clamav-db-0.90-0.1.C30mdk.i586.rpm
c8b968b8629b8d422c5aeef49da5fab2 corporate/3.0/i586/clamav-milter-0.90-0.1.C30mdk.i586.rpm
a10a5abcea78a66e11b8e2e8dfb8fa04 corporate/3.0/i586/clamd-0.90-0.1.C30mdk.i586.rpm
0b1cd6e53f293f2d143fa0e79fd4cc8b corporate/3.0/i586/libclamav1-0.90-0.1.C30mdk.i586.rpm
232b55ab3ffc888aca0d2a1915a8b106 corporate/3.0/i586/libclamav1-devel-0.90-0.1.C30mdk.i586.rpm
b19bb5df0c8520ddfa501beac3b12381 corporate/3.0/SRPMS/clamav-0.90-0.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
2800e661cd096538f393c8eed9cbe6e2 corporate/3.0/x86_64/clamav-0.90-0.1.C30mdk.x86_64.rpm
dfe0fc52a7f9efc5fd2be2e525996414 corporate/3.0/x86_64/clamav-db-0.90-0.1.C30mdk.x86_64.rpm
591678a80c4d873b9dbd3045f4b837cb corporate/3.0/x86_64/clamav-milter-0.90-0.1.C30mdk.x86_64.rpm
59e310e76b51ce87e9c3d2eba11b41f8 corporate/3.0/x86_64/clamd-0.90-0.1.C30mdk.x86_64.rpm
954ba4e79a8e259583c236d1e8922559 corporate/3.0/x86_64/lib64clamav1-0.90-0.1.C30mdk.x86_64.rpm
cc685b342368205402fd7e33dbb8ed0c corporate/3.0/x86_64/lib64clamav1-devel-0.90-0.1.C30mdk.x86_64.rpm
b19bb5df0c8520ddfa501beac3b12381 corporate/3.0/SRPMS/clamav-0.90-0.1.C30mdk.src.rpm

Corporate 4.0:
e50bb43342dd1406dbf6066827e898fb corporate/4.0/i586/clamav-0.90-0.1.20060mlcs4.i586.rpm
b0c3b10edb2e890a713598f565a13555 corporate/4.0/i586/clamav-db-0.90-0.1.20060mlcs4.i586.rpm
b54c220f936aac40dff2a784637884d9 corporate/4.0/i586/clamav-milter-0.90-0.1.20060mlcs4.i586.rpm
e5c2f70f08edd228c352aa4349a43582 corporate/4.0/i586/clamd-0.90-0.1.20060mlcs4.i586.rpm
1aa94968f937436a168d9b33c3046fcc corporate/4.0/i586/libclamav1-0.90-0.1.20060mlcs4.i586.rpm
5c9a6917fc3b83c7a96d24532df37351 corporate/4.0/i586/libclamav1-devel-0.90-0.1.20060mlcs4.i586.rpm
772099a75eb5a6ee2949af173b9e1b51 corporate/4.0/SRPMS/clamav-0.90-0.1.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
76a2be1b4cf681342a3d5993f330e189 corporate/4.0/x86_64/clamav-0.90-0.1.20060mlcs4.x86_64.rpm
5e17ee07795168e109e6956ef98348d3 corporate/4.0/x86_64/clamav-db-0.90-0.1.20060mlcs4.x86_64.rpm
6d361ea87425a4b297e6245eee216a30 corporate/4.0/x86_64/clamav-milter-0.90-0.1.20060mlcs4.x86_64.rpm
a0ee52c4f866b104bc89a337ae4a5fb4 corporate/4.0/x86_64/clamd-0.90-0.1.20060mlcs4.x86_64.rpm
5f81def8296e37bc2a9a1aa818431362 corporate/4.0/x86_64/lib64clamav1-0.90-0.1.20060mlcs4.x86_64.rpm
580883088be552b2c9eea7634e16622f corporate/4.0/x86_64/lib64clamav1-devel-0.90-0.1.20060mlcs4.x86_64.rpm
772099a75eb5a6ee2949af173b9e1b51 corporate/4.0/SRPMS/clamav-0.90-0.1.20060mlcs4.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: php security update
Advisory ID: RHSA-2007:0076-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0076.html
Issue date: 2007-02-19
Updated on: 2007-02-19
Product: Red Hat Enterprise Linux
CVE Names: CVE-2007-0906 CVE-2007-0907 CVE-2007-0908 CVE-2007-0909 CVE-2007-0910 CVE-2007-0988


1. Summary:

Updated PHP packages that fix several security issues are now available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Web server.

A number of buffer overflow flaws were found in the PHP session extension, the str_replace() function, and the imap_mail_compose() function. If very long strings under the control of an attacker are passed to the str_replace() function then an integer overflow could occur in memory allocation. If a script uses the imap_mail_compose() function to create a new MIME message based on an input body from an untrusted source, it could result in a heap overflow. An attacker who is able to access a PHP application affected by any these issues could trigger these flaws and possibly execute arbitrary code as the 'apache' user. (CVE-2007-0906)

If unserializing untrusted data on 64-bit platforms, the zend_hash_init() function can be forced to enter an infinite loop, consuming CPU resources for a limited length of time, until the script timeout alarm aborts execution of the script. (CVE-2007-0988)

If the wddx extension is used to import WDDX data from an untrusted source, certain WDDX input packets may allow a random portion of heap memory to be exposed. (CVE-2007-0908)

If the odbc_result_all() function is used to display data from a database, and the contents of the database table are under the control of an attacker, a format string vulnerability is possible which could lead to the execution of arbitrary code. (CVE-2007-0909)

A one byte memory read will always occur before the beginning of a buffer, which could be triggered for example by any use of the header() function in a script. However it is unlikely that this would have any effect. (CVE-2007-0907)

Several flaws in PHP could allows attackers to "clobber" certain super-global variables via unspecified vectors. (CVE-2007-0910)

Users of PHP should upgrade to these updated packages which contain backported patches to correct these issues.

Red Hat would like to thank Stefan Esser for his help diagnosing these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

228858 - CVE-2007-0906 PHP security issues (CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-0988)

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/php-4.3.2-39.ent.src.rpm
334e0e7ff2f38110fb88e1083ba06e2e php-4.3.2-39.ent.src.rpm

i386:
4da9c3e985be256827b4fc3efb999381 php-4.3.2-39.ent.i386.rpm
b3063a608e6b7dd48145dcc6849f47c2
php-debuginfo-4.3.2-39.ent.i386.rpm
ed89834a88454fccbcd45d6003a4c769 php-devel-4.3.2-39.ent.i386.rpm
475ea2ea5ea293380d90cb6f1abef9f9
php-imap-4.3.2-39.ent.i386.rpm
de62a7d6c1904aa928fe98e0f9272439 php-ldap-4.3.2-39.ent.i386.rpm
f4b5bf5a21a529db128fec9123725c7b
php-mysql-4.3.2-39.ent.i386.rpm
366dd5a2fa353a6f8a67477a00a21849 php-odbc-4.3.2-39.ent.i386.rpm
5f5fe2a3a77dd74582c1d8658320ba4c
php-pgsql-4.3.2-39.ent.i386.rpm

ia64:
04df8afa411b481774159a6476ae3214 php-4.3.2-39.ent.ia64.rpm
3e83702897d41920353388bfe1aeb462
php-debuginfo-4.3.2-39.ent.ia64.rpm
2565b31e867991e88121b078a244cc79 php-devel-4.3.2-39.ent.ia64.rpm
3b1f70a9b262d767c34a75d8d6fe7fe6
php-imap-4.3.2-39.ent.ia64.rpm
4cfacf6c0a7ea7aa03d5586f713b3fb1 php-ldap-4.3.2-39.ent.ia64.rpm
5c4157bcd2ee71c720b2ffc53126a4a7
php-mysql-4.3.2-39.ent.ia64.rpm
144cbe6b4a99f94d2d1fc3e49b8253a7 php-odbc-4.3.2-39.ent.ia64.rpm
fdfe65bb679218761fafa7432a4e001f
php-pgsql-4.3.2-39.ent.ia64.rpm

ppc:
7465741a07e8d5e5702f85c704ccc2bc php-4.3.2-39.ent.ppc.rpm
5ebfe076326477485cef095fc4c25b94
php-debuginfo-4.3.2-39.ent.ppc.rpm
571565d467036b47579c1508a3703015 php-devel-4.3.2-39.ent.ppc.rpm
c475fb7a8f81bb316593281efc5dda9f
php-imap-4.3.2-39.ent.ppc.rpm
2412e790daa5951f66634ff70b61080d php-ldap-4.3.2-39.ent.ppc.rpm
82493eaf9f32662ed2742c8bf87f5067
php-mysql-4.3.2-39.ent.ppc.rpm
ff57932d8c7d20649ec6c8e8f47933b6 php-odbc-4.3.2-39.ent.ppc.rpm
f1c911a7f10b0fc5b52aba5515b44880
php-pgsql-4.3.2-39.ent.ppc.rpm

s390:
a2e29ef870928aa6b2feec96f69602bd php-4.3.2-39.ent.s390.rpm
b75b1c3ad2c470476f193c2be83b5a6f
php-debuginfo-4.3.2-39.ent.s390.rpm
c78c492d448b3f654a23a895d4bfcef1 php-devel-4.3.2-39.ent.s390.rpm
a0d4c13550b9483d76ab30adb5546a27
php-imap-4.3.2-39.ent.s390.rpm
2931347356432db8c09726aedf8252ef php-ldap-4.3.2-39.ent.s390.rpm
5f67485c37b9ebf8583c61c8748667b3
php-mysql-4.3.2-39.ent.s390.rpm
864de5e6321e968c427ec10eadf18929 php-odbc-4.3.2-39.ent.s390.rpm
9c9659dd8ad1efe1f8125b437eb834b9
php-pgsql-4.3.2-39.ent.s390.rpm

s390x:
84217cb13326032f516c2080f81d07f0 php-4.3.2-39.ent.s390x.rpm
a9743a797892495c563b49777f0bfe7e
php-debuginfo-4.3.2-39.ent.s390x.rpm
1e6d9d709d3fa232dbeb025837d8de88 php-devel-4.3.2-39.ent.s390x.rpm
58418ba5e99cdda2782bc978ae37c727
php-imap-4.3.2-39.ent.s390x.rpm
03b1e6d2b6191e50468c203ca7633894 php-ldap-4.3.2-39.ent.s390x.rpm
03048c57fd7d242fde135d1c418c7c5b
php-mysql-4.3.2-39.ent.s390x.rpm
dde98c2319a57db8f94a90dd674c5837 php-odbc-4.3.2-39.ent.s390x.rpm
cada85f8c79710c38cba22fa1096a04c
php-pgsql-4.3.2-39.ent.s390x.rpm

x86_64:
d1002b5ad6955cc920f9d0519d6e4c29 php-4.3.2-39.ent.x86_64.rpm
38e00f9bbbc328bcd61b20af896c3704
php-debuginfo-4.3.2-39.ent.x86_64.rpm
27f692d05bb39aa498c765a31846e330 php-devel-4.3.2-39.ent.x86_64.rpm
d1d70ae13f11ef4f29636c5158b7fa46
php-imap-4.3.2-39.ent.x86_64.rpm
132041f96278993aa8d5cf66118972ef php-ldap-4.3.2-39.ent.x86_64.rpm
d6341e87d708600fc38bbe4c63ea98ab
php-mysql-4.3.2-39.ent.x86_64.rpm
baffdb94002ae386b97d6c56805cacd3 php-odbc-4.3.2-39.ent.x86_64.rpm
ae97cf37342f6352e7ee3904a35d747e
php-pgsql-4.3.2-39.ent.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/php-4.3.2-39.ent.src.rpm
334e0e7ff2f38110fb88e1083ba06e2e php-4.3.2-39.ent.src.rpm

i386:
4da9c3e985be256827b4fc3efb999381 php-4.3.2-39.ent.i386.rpm
b3063a608e6b7dd48145dcc6849f47c2
php-debuginfo-4.3.2-39.ent.i386.rpm
ed89834a88454fccbcd45d6003a4c769 php-devel-4.3.2-39.ent.i386.rpm
475ea2ea5ea293380d90cb6f1abef9f9
php-imap-4.3.2-39.ent.i386.rpm
de62a7d6c1904aa928fe98e0f9272439 php-ldap-4.3.2-39.ent.i386.rpm
f4b5bf5a21a529db128fec9123725c7b
php-mysql-4.3.2-39.ent.i386.rpm
366dd5a2fa353a6f8a67477a00a21849 php-odbc-4.3.2-39.ent.i386.rpm
5f5fe2a3a77dd74582c1d8658320ba4c
php-pgsql-4.3.2-39.ent.i386.rpm

x86_64:
d1002b5ad6955cc920f9d0519d6e4c29 php-4.3.2-39.ent.x86_64.rpm
38e00f9bbbc328bcd61b20af896c3704
php-debuginfo-4.3.2-39.ent.x86_64.rpm
27f692d05bb39aa498c765a31846e330 php-devel-4.3.2-39.ent.x86_64.rpm
d1d70ae13f11ef4f29636c5158b7fa46
php-imap-4.3.2-39.ent.x86_64.rpm
132041f96278993aa8d5cf66118972ef php-ldap-4.3.2-39.ent.x86_64.rpm
d6341e87d708600fc38bbe4c63ea98ab
php-mysql-4.3.2-39.ent.x86_64.rpm
baffdb94002ae386b97d6c56805cacd3 php-odbc-4.3.2-39.ent.x86_64.rpm
ae97cf37342f6352e7ee3904a35d747e
php-pgsql-4.3.2-39.ent.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/php-4.3.2-39.ent.src.rpm
334e0e7ff2f38110fb88e1083ba06e2e php-4.3.2-39.ent.src.rpm

i386:
4da9c3e985be256827b4fc3efb999381 php-4.3.2-39.ent.i386.rpm
b3063a608e6b7dd48145dcc6849f47c2
php-debuginfo-4.3.2-39.ent.i386.rpm
ed89834a88454fccbcd45d6003a4c769 php-devel-4.3.2-39.ent.i386.rpm
475ea2ea5ea293380d90cb6f1abef9f9
php-imap-4.3.2-39.ent.i386.rpm
de62a7d6c1904aa928fe98e0f9272439 php-ldap-4.3.2-39.ent.i386.rpm
f4b5bf5a21a529db128fec9123725c7b
php-mysql-4.3.2-39.ent.i386.rpm
366dd5a2fa353a6f8a67477a00a21849 php-odbc-4.3.2-39.ent.i386.rpm
5f5fe2a3a77dd74582c1d8658320ba4c
php-pgsql-4.3.2-39.ent.i386.rpm

ia64:
04df8afa411b481774159a6476ae3214 php-4.3.2-39.ent.ia64.rpm
3e83702897d41920353388bfe1aeb462
php-debuginfo-4.3.2-39.ent.ia64.rpm
2565b31e867991e88121b078a244cc79 php-devel-4.3.2-39.ent.ia64.rpm
3b1f70a9b262d767c34a75d8d6fe7fe6
php-imap-4.3.2-39.ent.ia64.rpm
4cfacf6c0a7ea7aa03d5586f713b3fb1 php-ldap-4.3.2-39.ent.ia64.rpm
5c4157bcd2ee71c720b2ffc53126a4a7
php-mysql-4.3.2-39.ent.ia64.rpm
144cbe6b4a99f94d2d1fc3e49b8253a7 php-odbc-4.3.2-39.ent.ia64.rpm
fdfe65bb679218761fafa7432a4e001f
php-pgsql-4.3.2-39.ent.ia64.rpm

x86_64:
d1002b5ad6955cc920f9d0519d6e4c29 php-4.3.2-39.ent.x86_64.rpm
38e00f9bbbc328bcd61b20af896c3704
php-debuginfo-4.3.2-39.ent.x86_64.rpm
27f692d05bb39aa498c765a31846e330 php-devel-4.3.2-39.ent.x86_64.rpm
d1d70ae13f11ef4f29636c5158b7fa46
php-imap-4.3.2-39.ent.x86_64.rpm
132041f96278993aa8d5cf66118972ef php-ldap-4.3.2-39.ent.x86_64.rpm
d6341e87d708600fc38bbe4c63ea98ab
php-mysql-4.3.2-39.ent.x86_64.rpm
baffdb94002ae386b97d6c56805cacd3 php-odbc-4.3.2-39.ent.x86_64.rpm
ae97cf37342f6352e7ee3904a35d747e
php-pgsql-4.3.2-39.ent.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/php-4.3.2-39.ent.src.rpm
334e0e7ff2f38110fb88e1083ba06e2e php-4.3.2-39.ent.src.rpm

i386:
4da9c3e985be256827b4fc3efb999381 php-4.3.2-39.ent.i386.rpm
b3063a608e6b7dd48145dcc6849f47c2
php-debuginfo-4.3.2-39.ent.i386.rpm
ed89834a88454fccbcd45d6003a4c769 php-devel-4.3.2-39.ent.i386.rpm
475ea2ea5ea293380d90cb6f1abef9f9
php-imap-4.3.2-39.ent.i386.rpm
de62a7d6c1904aa928fe98e0f9272439 php-ldap-4.3.2-39.ent.i386.rpm
f4b5bf5a21a529db128fec9123725c7b
php-mysql-4.3.2-39.ent.i386.rpm
366dd5a2fa353a6f8a67477a00a21849 php-odbc-4.3.2-39.ent.i386.rpm
5f5fe2a3a77dd74582c1d8658320ba4c
php-pgsql-4.3.2-39.ent.i386.rpm

ia64:
04df8afa411b481774159a6476ae3214 php-4.3.2-39.ent.ia64.rpm
3e83702897d41920353388bfe1aeb462
php-debuginfo-4.3.2-39.ent.ia64.rpm
2565b31e867991e88121b078a244cc79 php-devel-4.3.2-39.ent.ia64.rpm
3b1f70a9b262d767c34a75d8d6fe7fe6
php-imap-4.3.2-39.ent.ia64.rpm
4cfacf6c0a7ea7aa03d5586f713b3fb1 php-ldap-4.3.2-39.ent.ia64.rpm
5c4157bcd2ee71c720b2ffc53126a4a7
php-mysql-4.3.2-39.ent.ia64.rpm
144cbe6b4a99f94d2d1fc3e49b8253a7 php-odbc-4.3.2-39.ent.ia64.rpm
fdfe65bb679218761fafa7432a4e001f
php-pgsql-4.3.2-39.ent.ia64.rpm

x86_64:
d1002b5ad6955cc920f9d0519d6e4c29 php-4.3.2-39.ent.x86_64.rpm
38e00f9bbbc328bcd61b20af896c3704
php-debuginfo-4.3.2-39.ent.x86_64.rpm
27f692d05bb39aa498c765a31846e330 php-devel-4.3.2-39.ent.x86_64.rpm
d1d70ae13f11ef4f29636c5158b7fa46
php-imap-4.3.2-39.ent.x86_64.rpm
132041f96278993aa8d5cf66118972ef php-ldap-4.3.2-39.ent.x86_64.rpm
d6341e87d708600fc38bbe4c63ea98ab
php-mysql-4.3.2-39.ent.x86_64.rpm
baffdb94002ae386b97d6c56805cacd3 php-odbc-4.3.2-39.ent.x86_64.rpm
ae97cf37342f6352e7ee3904a35d747e
php-pgsql-4.3.2-39.ent.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/php-4.3.9-3.22.3.src.rpm
a954d249ca8cd0e03864c3cbac5f26b8 php-4.3.9-3.22.3.src.rpm

i386:
144c9a64ae174706ae864d5bf94a8cb2 php-4.3.9-3.22.3.i386.rpm
90971f6472640809c494f46cbcaf1bdd
php-debuginfo-4.3.9-3.22.3.i386.rpm
9aff6b4cfe675f62b986cbdfd401ef48 php-devel-4.3.9-3.22.3.i386.rpm
fc7d8f3ff093d36417259cb45d53b597
php-domxml-4.3.9-3.22.3.i386.rpm
1c7d95325faf1f7f1c7719190543411e php-gd-4.3.9-3.22.3.i386.rpm
b87ac2b80f5498fece096172afedf31d
php-imap-4.3.9-3.22.3.i386.rpm
4681e79b4b0a37b41b3b1c99c68408d0 php-ldap-4.3.9-3.22.3.i386.rpm
861437499c4426cb220cac6332ea67ff
php-mbstring-4.3.9-3.22.3.i386.rpm
f93b8e4156ac609e56bd29a9987f9b2d php-mysql-4.3.9-3.22.3.i386.rpm
9ec4c2486345f7ed3192a07ad10ec32e
php-ncurses-4.3.9-3.22.3.i386.rpm
6cf3e8b518946cfca6fb02601731811a php-odbc-4.3.9-3.22.3.i386.rpm
81369039016e43d6f2559ae112b76272
php-pear-4.3.9-3.22.3.i386.rpm
e0a1147400141dc32ba7a73efd774c5b php-pgsql-4.3.9-3.22.3.i386.rpm
1b4822fd2069e98a59ca5a8fbca369e8
php-snmp-4.3.9-3.22.3.i386.rpm
c6d716435a59be6d286afef87c580a25 php-xmlrpc-4.3.9-3.22.3.i386.rpm

ia64:
199ca047b66ee4a6557d7d3f3c38f873 php-4.3.9-3.22.3.ia64.rpm
f9cc7842a4aa8b70f384df7c779bd667
php-debuginfo-4.3.9-3.22.3.ia64.rpm
ff3ec026286d1a34114cb72672ecd3f4 php-devel-4.3.9-3.22.3.ia64.rpm
e8493183ededf4a0e3a0e83c0b592f2a
php-domxml-4.3.9-3.22.3.ia64.rpm
f4c0d643c08b85787f57107ff51041b0 php-gd-4.3.9-3.22.3.ia64.rpm
44842ad7449d6bff948a085865e0af54
php-imap-4.3.9-3.22.3.ia64.rpm
cb11e0b06cdd4fbe89ba7f4ed092d923 php-ldap-4.3.9-3.22.3.ia64.rpm
568a7912d2ed6423bfda734c08f6d437
php-mbstring-4.3.9-3.22.3.ia64.rpm
d1574241f8b4c86b026edca3724e7488 php-mysql-4.3.9-3.22.3.ia64.rpm
6152d7b768392cb4c7f4420f87498e76
php-ncurses-4.3.9-3.22.3.ia64.rpm
4f43bb7a7147b3956104033bd19c08e1 php-odbc-4.3.9-3.22.3.ia64.rpm
2960bbeba55607269bfde8513249b23d
php-pear-4.3.9-3.22.3.ia64.rpm
331830c2e27c787f89f6c550fce68223 php-pgsql-4.3.9-3.22.3.ia64.rpm
d168c65023f344b7664774a5fcd7ed79
php-snmp-4.3.9-3.22.3.ia64.rpm
301669eaa23485727c8f07a2fe960c9f php-xmlrpc-4.3.9-3.22.3.ia64.rpm

ppc:
4c6db07fe089fef7f36b7bc077b716d3 php-4.3.9-3.22.3.ppc.rpm
beca9f4732d60b2c8e68a08f2ac91bc7
php-debuginfo-4.3.9-3.22.3.ppc.rpm
62097749817eee902a9b80384cc8d59c php-devel-4.3.9-3.22.3.ppc.rpm
9d00fabdbc9fd0915f9b85beb9efd2eb
php-domxml-4.3.9-3.22.3.ppc.rpm
ac71759c8b4ef95b06fefe86b6e4341d php-gd-4.3.9-3.22.3.ppc.rpm
df5b079c0688d34d124970817b4ba0fe
php-imap-4.3.9-3.22.3.ppc.rpm
9047a48cd3991369483acc2e7f72c48a php-ldap-4.3.9-3.22.3.ppc.rpm
cc0468ff78fb1405314128adba5b4347
php-mbstring-4.3.9-3.22.3.ppc.rpm
1f6079f3a80e697196747ed401e77a06 php-mysql-4.3.9-3.22.3.ppc.rpm
bfa51d88bf8c52bc51edf9a9e06cea60
php-ncurses-4.3.9-3.22.3.ppc.rpm
0ebdfcc733aa21f10d1bf8639054cf7a php-odbc-4.3.9-3.22.3.ppc.rpm
df4889b7caf343e6c9d3f9971c5882df
php-pear-4.3.9-3.22.3.ppc.rpm
2e6c51f81322fec95fdf3af8a835df46 php-pgsql-4.3.9-3.22.3.ppc.rpm
1ad1067065a1e6b55954f102cefacecc
php-snmp-4.3.9-3.22.3.ppc.rpm
2edb715c10def75b6c92b8c5253e5b37 php-xmlrpc-4.3.9-3.22.3.ppc.rpm

s390:
0c140ffb303370bfce0af6ac947b3bd6 php-4.3.9-3.22.3.s390.rpm
393ff435b9a477c618eab815f98b72c7
php-debuginfo-4.3.9-3.22.3.s390.rpm
66824af01d592309f5673d74ba13797a php-devel-4.3.9-3.22.3.s390.rpm
98099e79816000aa22340f30a550d7ac
php-domxml-4.3.9-3.22.3.s390.rpm
f3c3eb16034b039e8d1a3e77f2d4e383 php-gd-4.3.9-3.22.3.s390.rpm
7d1ecf3f77ff01249c447fb6e78757ab
php-imap-4.3.9-3.22.3.s390.rpm
2f1c85fd9c6947b518d8cf275e968735 php-ldap-4.3.9-3.22.3.s390.rpm
b1b767c04c83c7c70d37226de7dba8c5
php-mbstring-4.3.9-3.22.3.s390.rpm
89c43d1afe38989d87fa6a57116c9d7a php-mysql-4.3.9-3.22.3.s390.rpm
c4a2ea5228fd6c22e498612fc7d2e17e
php-ncurses-4.3.9-3.22.3.s390.rpm
847a8e841356375aebd4282da79955a4 php-odbc-4.3.9-3.22.3.s390.rpm
209f109e589459e4e2e19545dd4bc512
php-pear-4.3.9-3.22.3.s390.rpm
c2b09474ea5073b8424680067b1ad6c4 php-pgsql-4.3.9-3.22.3.s390.rpm
f96afc95bfda9c253379bbca1be10900
php-snmp-4.3.9-3.22.3.s390.rpm
5b56f025bee8ec4eb4eeb169b63d3c60 php-xmlrpc-4.3.9-3.22.3.s390.rpm

s390x:
3535b24a963d2fff0d700c9713678e5e php-4.3.9-3.22.3.s390x.rpm
1cfcccdd5f0e02995a51c3ea3e849dba
php-debuginfo-4.3.9-3.22.3.s390x.rpm
7949f28643e128b73bd73db619bff818 php-devel-4.3.9-3.22.3.s390x.rpm
987cbab849a42b5523d8b77d78aa9bea
php-domxml-4.3.9-3.22.3.s390x.rpm
821c61382dbefca04424c88befb5681c php-gd-4.3.9-3.22.3.s390x.rpm
f47ace8f09516615d873df2485bd43bd
php-imap-4.3.9-3.22.3.s390x.rpm
24f06687af8986e93f25ffaf246ec493 php-ldap-4.3.9-3.22.3.s390x.rpm
7ed585f4536cc8348cec85a56ffa3b18
php-mbstring-4.3.9-3.22.3.s390x.rpm
0c6b315195f6a047e574e0e0d539fdd7 php-mysql-4.3.9-3.22.3.s390x.rpm
190521a81ca21b264c6741904fe4b53b
php-ncurses-4.3.9-3.22.3.s390x.rpm
bf0deae5bc75cb7fb2d2463201c5e7dd php-odbc-4.3.9-3.22.3.s390x.rpm
b3711111e4b4777ef66cdaaceb6e5b89
php-pear-4.3.9-3.22.3.s390x.rpm
b2272a3b079671f2c7744f2589baf475 php-pgsql-4.3.9-3.22.3.s390x.rpm
34bb6ec8d7950f30b02a1da5f9693333
php-snmp-4.3.9-3.22.3.s390x.rpm
f88518164a17902d0c3f45d5e6291113 php-xmlrpc-4.3.9-3.22.3.s390x.rpm

x86_64:
1a8f622a55edc590bc836dc577c67313 php-4.3.9-3.22.3.x86_64.rpm
59661959dafc76be8db0c6c5534c04ed
php-debuginfo-4.3.9-3.22.3.x86_64.rpm
477b586dd9dd24e7208a254894f426aa php-devel-4.3.9-3.22.3.x86_64.rpm
434e194613624591bc2945d402b335c8
php-domxml-4.3.9-3.22.3.x86_64.rpm
dde9c8dc92ba9aa7b3b82abe7eca1a46 php-gd-4.3.9-3.22.3.x86_64.rpm
ce88add4f6b234c16e27cdc8617ad1ee
php-imap-4.3.9-3.22.3.x86_64.rpm
37a0092e51c14be7b4dab993c85c8f3d php-ldap-4.3.9-3.22.3.x86_64.rpm
c5b16f7a2d4da01a38e18eb0b92e329a
php-mbstring-4.3.9-3.22.3.x86_64.rpm
9f5b2f72b73928a3eb274edd8a99fed5 php-mysql-4.3.9-3.22.3.x86_64.rpm
5d60bbf151f212ea1dc61086919315c4
php-ncurses-4.3.9-3.22.3.x86_64.rpm
f62a0a8783433f67818e3a88597dd754 php-odbc-4.3.9-3.22.3.x86_64.rpm
7c16f8eb089b2c044f0c70b33437ceab
php-pear-4.3.9-3.22.3.x86_64.rpm
24fc5e41ed8e3617e593c20389ef5252 php-pgsql-4.3.9-3.22.3.x86_64.rpm
b48b22e969361c70682f3d8c1fbdbede
php-snmp-4.3.9-3.22.3.x86_64.rpm
cd14e8a88891b0a17d5a3ef57b8e015e php-xmlrpc-4.3.9-3.22.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/php-4.3.9-3.22.3.src.rpm
a954d249ca8cd0e03864c3cbac5f26b8 php-4.3.9-3.22.3.src.rpm

i386:
144c9a64ae174706ae864d5bf94a8cb2 php-4.3.9-3.22.3.i386.rpm
90971f6472640809c494f46cbcaf1bdd
php-debuginfo-4.3.9-3.22.3.i386.rpm
9aff6b4cfe675f62b986cbdfd401ef48 php-devel-4.3.9-3.22.3.i386.rpm
fc7d8f3ff093d36417259cb45d53b597
php-domxml-4.3.9-3.22.3.i386.rpm
1c7d95325faf1f7f1c7719190543411e php-gd-4.3.9-3.22.3.i386.rpm
b87ac2b80f5498fece096172afedf31d
php-imap-4.3.9-3.22.3.i386.rpm
4681e79b4b0a37b41b3b1c99c68408d0 php-ldap-4.3.9-3.22.3.i386.rpm
861437499c4426cb220cac6332ea67ff
php-mbstring-4.3.9-3.22.3.i386.rpm
f93b8e4156ac609e56bd29a9987f9b2d php-mysql-4.3.9-3.22.3.i386.rpm
9ec4c2486345f7ed3192a07ad10ec32e
php-ncurses-4.3.9-3.22.3.i386.rpm
6cf3e8b518946cfca6fb02601731811a php-odbc-4.3.9-3.22.3.i386.rpm
81369039016e43d6f2559ae112b76272
php-pear-4.3.9-3.22.3.i386.rpm
e0a1147400141dc32ba7a73efd774c5b php-pgsql-4.3.9-3.22.3.i386.rpm
1b4822fd2069e98a59ca5a8fbca369e8
php-snmp-4.3.9-3.22.3.i386.rpm
c6d716435a59be6d286afef87c580a25 php-xmlrpc-4.3.9-3.22.3.i386.rpm

x86_64:
1a8f622a55edc590bc836dc577c67313 php-4.3.9-3.22.3.x86_64.rpm
59661959dafc76be8db0c6c5534c04ed
php-debuginfo-4.3.9-3.22.3.x86_64.rpm
477b586dd9dd24e7208a254894f426aa php-devel-4.3.9-3.22.3.x86_64.rpm
434e194613624591bc2945d402b335c8
php-domxml-4.3.9-3.22.3.x86_64.rpm
dde9c8dc92ba9aa7b3b82abe7eca1a46 php-gd-4.3.9-3.22.3.x86_64.rpm
ce88add4f6b234c16e27cdc8617ad1ee
php-imap-4.3.9-3.22.3.x86_64.rpm
37a0092e51c14be7b4dab993c85c8f3d php-ldap-4.3.9-3.22.3.x86_64.rpm
c5b16f7a2d4da01a38e18eb0b92e329a
php-mbstring-4.3.9-3.22.3.x86_64.rpm
9f5b2f72b73928a3eb274edd8a99fed5 php-mysql-4.3.9-3.22.3.x86_64.rpm
5d60bbf151f212ea1dc61086919315c4
php-ncurses-4.3.9-3.22.3.x86_64.rpm
f62a0a8783433f67818e3a88597dd754 php-odbc-4.3.9-3.22.3.x86_64.rpm
7c16f8eb089b2c044f0c70b33437ceab
php-pear-4.3.9-3.22.3.x86_64.rpm
24fc5e41ed8e3617e593c20389ef5252 php-pgsql-4.3.9-3.22.3.x86_64.rpm
b48b22e969361c70682f3d8c1fbdbede
php-snmp-4.3.9-3.22.3.x86_64.rpm
cd14e8a88891b0a17d5a3ef57b8e015e php-xmlrpc-4.3.9-3.22.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/php-4.3.9-3.22.3.src.rpm
a954d249ca8cd0e03864c3cbac5f26b8 php-4.3.9-3.22.3.src.rpm

i386:
144c9a64ae174706ae864d5bf94a8cb2 php-4.3.9-3.22.3.i386.rpm
90971f6472640809c494f46cbcaf1bdd
php-debuginfo-4.3.9-3.22.3.i386.rpm
9aff6b4cfe675f62b986cbdfd401ef48 php-devel-4.3.9-3.22.3.i386.rpm
fc7d8f3ff093d36417259cb45d53b597
php-domxml-4.3.9-3.22.3.i386.rpm
1c7d95325faf1f7f1c7719190543411e php-gd-4.3.9-3.22.3.i386.rpm
b87ac2b80f5498fece096172afedf31d
php-imap-4.3.9-3.22.3.i386.rpm
4681e79b4b0a37b41b3b1c99c68408d0 php-ldap-4.3.9-3.22.3.i386.rpm
861437499c4426cb220cac6332ea67ff
php-mbstring-4.3.9-3.22.3.i386.rpm
f93b8e4156ac609e56bd29a9987f9b2d php-mysql-4.3.9-3.22.3.i386.rpm
9ec4c2486345f7ed3192a07ad10ec32e
php-ncurses-4.3.9-3.22.3.i386.rpm
6cf3e8b518946cfca6fb02601731811a php-odbc-4.3.9-3.22.3.i386.rpm
81369039016e43d6f2559ae112b76272
php-pear-4.3.9-3.22.3.i386.rpm
e0a1147400141dc32ba7a73efd774c5b php-pgsql-4.3.9-3.22.3.i386.rpm
1b4822fd2069e98a59ca5a8fbca369e8
php-snmp-4.3.9-3.22.3.i386.rpm
c6d716435a59be6d286afef87c580a25 php-xmlrpc-4.3.9-3.22.3.i386.rpm

ia64:
199ca047b66ee4a6557d7d3f3c38f873 php-4.3.9-3.22.3.ia64.rpm
f9cc7842a4aa8b70f384df7c779bd667
php-debuginfo-4.3.9-3.22.3.ia64.rpm
ff3ec026286d1a34114cb72672ecd3f4 php-devel-4.3.9-3.22.3.ia64.rpm
e8493183ededf4a0e3a0e83c0b592f2a
php-domxml-4.3.9-3.22.3.ia64.rpm
f4c0d643c08b85787f57107ff51041b0 php-gd-4.3.9-3.22.3.ia64.rpm
44842ad7449d6bff948a085865e0af54
php-imap-4.3.9-3.22.3.ia64.rpm
cb11e0b06cdd4fbe89ba7f4ed092d923 php-ldap-4.3.9-3.22.3.ia64.rpm
568a7912d2ed6423bfda734c08f6d437
php-mbstring-4.3.9-3.22.3.ia64.rpm
d1574241f8b4c86b026edca3724e7488 php-mysql-4.3.9-3.22.3.ia64.rpm
6152d7b768392cb4c7f4420f87498e76
php-ncurses-4.3.9-3.22.3.ia64.rpm
4f43bb7a7147b3956104033bd19c08e1 php-odbc-4.3.9-3.22.3.ia64.rpm
2960bbeba55607269bfde8513249b23d
php-pear-4.3.9-3.22.3.ia64.rpm
331830c2e27c787f89f6c550fce68223 php-pgsql-4.3.9-3.22.3.ia64.rpm
d168c65023f344b7664774a5fcd7ed79
php-snmp-4.3.9-3.22.3.ia64.rpm
301669eaa23485727c8f07a2fe960c9f php-xmlrpc-4.3.9-3.22.3.ia64.rpm

x86_64:
1a8f622a55edc590bc836dc577c67313 php-4.3.9-3.22.3.x86_64.rpm
59661959dafc76be8db0c6c5534c04ed
php-debuginfo-4.3.9-3.22.3.x86_64.rpm
477b586dd9dd24e7208a254894f426aa php-devel-4.3.9-3.22.3.x86_64.rpm
434e194613624591bc2945d402b335c8
php-domxml-4.3.9-3.22.3.x86_64.rpm
dde9c8dc92ba9aa7b3b82abe7eca1a46 php-gd-4.3.9-3.22.3.x86_64.rpm
ce88add4f6b234c16e27cdc8617ad1ee
php-imap-4.3.9-3.22.3.x86_64.rpm
37a0092e51c14be7b4dab993c85c8f3d php-ldap-4.3.9-3.22.3.x86_64.rpm
c5b16f7a2d4da01a38e18eb0b92e329a
php-mbstring-4.3.9-3.22.3.x86_64.rpm
9f5b2f72b73928a3eb274edd8a99fed5 php-mysql-4.3.9-3.22.3.x86_64.rpm
5d60bbf151f212ea1dc61086919315c4
php-ncurses-4.3.9-3.22.3.x86_64.rpm
f62a0a8783433f67818e3a88597dd754 php-odbc-4.3.9-3.22.3.x86_64.rpm
7c16f8eb089b2c044f0c70b33437ceab
php-pear-4.3.9-3.22.3.x86_64.rpm
24fc5e41ed8e3617e593c20389ef5252 php-pgsql-4.3.9-3.22.3.x86_64.rpm
b48b22e969361c70682f3d8c1fbdbede
php-snmp-4.3.9-3.22.3.x86_64.rpm
cd14e8a88891b0a17d5a3ef57b8e015e php-xmlrpc-4.3.9-3.22.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/php-4.3.9-3.22.3.src.rpm
a954d249ca8cd0e03864c3cbac5f26b8 php-4.3.9-3.22.3.src.rpm

i386:
144c9a64ae174706ae864d5bf94a8cb2 php-4.3.9-3.22.3.i386.rpm
90971f6472640809c494f46cbcaf1bdd
php-debuginfo-4.3.9-3.22.3.i386.rpm
9aff6b4cfe675f62b986cbdfd401ef48 php-devel-4.3.9-3.22.3.i386.rpm
fc7d8f3ff093d36417259cb45d53b597
php-domxml-4.3.9-3.22.3.i386.rpm
1c7d95325faf1f7f1c7719190543411e php-gd-4.3.9-3.22.3.i386.rpm
b87ac2b80f5498fece096172afedf31d
php-imap-4.3.9-3.22.3.i386.rpm
4681e79b4b0a37b41b3b1c99c68408d0 php-ldap-4.3.9-3.22.3.i386.rpm
861437499c4426cb220cac6332ea67ff
php-mbstring-4.3.9-3.22.3.i386.rpm
f93b8e4156ac609e56bd29a9987f9b2d php-mysql-4.3.9-3.22.3.i386.rpm
9ec4c2486345f7ed3192a07ad10ec32e
php-ncurses-4.3.9-3.22.3.i386.rpm
6cf3e8b518946cfca6fb02601731811a php-odbc-4.3.9-3.22.3.i386.rpm
81369039016e43d6f2559ae112b76272
php-pear-4.3.9-3.22.3.i386.rpm
e0a1147400141dc32ba7a73efd774c5b php-pgsql-4.3.9-3.22.3.i386.rpm
1b4822fd2069e98a59ca5a8fbca369e8
php-snmp-4.3.9-3.22.3.i386.rpm
c6d716435a59be6d286afef87c580a25 php-xmlrpc-4.3.9-3.22.3.i386.rpm

ia64:
199ca047b66ee4a6557d7d3f3c38f873 php-4.3.9-3.22.3.ia64.rpm
f9cc7842a4aa8b70f384df7c779bd667
php-debuginfo-4.3.9-3.22.3.ia64.rpm
ff3ec026286d1a34114cb72672ecd3f4 php-devel-4.3.9-3.22.3.ia64.rpm
e8493183ededf4a0e3a0e83c0b592f2a
php-domxml-4.3.9-3.22.3.ia64.rpm
f4c0d643c08b85787f57107ff51041b0 php-gd-4.3.9-3.22.3.ia64.rpm
44842ad7449d6bff948a085865e0af54
php-imap-4.3.9-3.22.3.ia64.rpm
cb11e0b06cdd4fbe89ba7f4ed092d923 php-ldap-4.3.9-3.22.3.ia64.rpm
568a7912d2ed6423bfda734c08f6d437
php-mbstring-4.3.9-3.22.3.ia64.rpm
d1574241f8b4c86b026edca3724e7488 php-mysql-4.3.9-3.22.3.ia64.rpm
6152d7b768392cb4c7f4420f87498e76
php-ncurses-4.3.9-3.22.3.ia64.rpm
4f43bb7a7147b3956104033bd19c08e1 php-odbc-4.3.9-3.22.3.ia64.rpm
2960bbeba55607269bfde8513249b23d
php-pear-4.3.9-3.22.3.ia64.rpm
331830c2e27c787f89f6c550fce68223 php-pgsql-4.3.9-3.22.3.ia64.rpm
d168c65023f344b7664774a5fcd7ed79
php-snmp-4.3.9-3.22.3.ia64.rpm
301669eaa23485727c8f07a2fe960c9f php-xmlrpc-4.3.9-3.22.3.ia64.rpm

x86_64:
1a8f622a55edc590bc836dc577c67313 php-4.3.9-3.22.3.x86_64.rpm
59661959dafc76be8db0c6c5534c04ed
php-debuginfo-4.3.9-3.22.3.x86_64.rpm
477b586dd9dd24e7208a254894f426aa php-devel-4.3.9-3.22.3.x86_64.rpm
434e194613624591bc2945d402b335c8
php-domxml-4.3.9-3.22.3.x86_64.rpm
dde9c8dc92ba9aa7b3b82abe7eca1a46 php-gd-4.3.9-3.22.3.x86_64.rpm
ce88add4f6b234c16e27cdc8617ad1ee
php-imap-4.3.9-3.22.3.x86_64.rpm
37a0092e51c14be7b4dab993c85c8f3d php-ldap-4.3.9-3.22.3.x86_64.rpm
c5b16f7a2d4da01a38e18eb0b92e329a
php-mbstring-4.3.9-3.22.3.x86_64.rpm
9f5b2f72b73928a3eb274edd8a99fed5 php-mysql-4.3.9-3.22.3.x86_64.rpm
5d60bbf151f212ea1dc61086919315c4
php-ncurses-4.3.9-3.22.3.x86_64.rpm
f62a0a8783433f67818e3a88597dd754 php-odbc-4.3.9-3.22.3.x86_64.rpm
7c16f8eb089b2c044f0c70b33437ceab
php-pear-4.3.9-3.22.3.x86_64.rpm
24fc5e41ed8e3617e593c20389ef5252 php-pgsql-4.3.9-3.22.3.x86_64.rpm
b48b22e969361c70682f3d8c1fbdbede
php-snmp-4.3.9-3.22.3.x86_64.rpm
cd14e8a88891b0a17d5a3ef57b8e015e php-xmlrpc-4.3.9-3.22.3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from