---

Advisories, July 12, 2006

Mandriva Linux


Mandriva Linux Security Advisory MDKSA-2006:117-1
http://www.mandriva.com/security/


Package : libmms
Date : July 12, 2006
Affected: 2006.0


Problem Description:

Stack-based buffer overflow in MiMMS 0.0.9 allows remote
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via the (1) send_command, (2)
string_utf16, (3) get_data, and (4) get_media_packet functions, and
possibly other functions. Libmms uses the same vulnerable code.

Update:

The previous update for libmms had an incorrect/incomplete
patch. This update includes a more complete fix for the issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200


Updated Packages:

Mandriva Linux 2006.0:
e9fd0a2b5764917cfaf2e9bf45af2e5d
2006.0/RPMS/libmms0-0.1-1.2.20060mdk.i586.rpm
b556179bdc4842b0cc923346494dadce
2006.0/RPMS/libmms0-devel-0.1-1.2.20060mdk.i586.rpm
a539ad416a9f9b1252fa12e5b2c29b60
2006.0/SRPMS/libmms-0.1-1.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
2a16fb87e7c00d2246f5f0716d6451eb
x86_64/2006.0/RPMS/lib64mms0-0.1-1.2.20060mdk.x86_64.rpm
b2775f1f51106cfdb390627a455c3c28
x86_64/2006.0/RPMS/lib64mms0-devel-0.1-1.2.20060mdk.x86_64.rpm
a539ad416a9f9b1252fa12e5b2c29b60
x86_64/2006.0/SRPMS/libmms-0.1-1.2.20060mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>


Mandriva Linux Security Advisory MDKSA-2006:121
http://www.mandriva.com/security/


Package : xine-lib
Date : July 12, 2006
Affected: 2006.0, Corporate 3.0


Problem Description:

Stack-based buffer overflow in MiMMS 0.0.9 allows remote
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via the (1) send_command, (2)
string_utf16, (3) get_data, and (4) get_media_packet functions, and
possibly other functions. Xine-lib contains an embedded copy of the
same vulnerable code.

The updated packages have been patched to correct this
issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2200


Updated Packages:

Mandriva Linux 2006.0:
34c23d8a858d2a2687297e25618c7b04
2006.0/RPMS/libxine1-1.1.0-9.6.20060mdk.i586.rpm
57f9a069b8fc968a12ce24605390c1f1
2006.0/RPMS/libxine1-devel-1.1.0-9.6.20060mdk.i586.rpm
7c2652ce586d087793536649d7da6966
2006.0/RPMS/xine-aa-1.1.0-9.6.20060mdk.i586.rpm
37eff9bda8595acfbaf80e0998db1c9e
2006.0/RPMS/xine-arts-1.1.0-9.6.20060mdk.i586.rpm
e5672e6558978051f6878dea6ba961b5
2006.0/RPMS/xine-dxr3-1.1.0-9.6.20060mdk.i586.rpm
6527706516fb99a53f82d2c8c4b2e5f8
2006.0/RPMS/xine-esd-1.1.0-9.6.20060mdk.i586.rpm
10d172825fdd5dd2dd92dfafd5d60e23
2006.0/RPMS/xine-flac-1.1.0-9.6.20060mdk.i586.rpm
87b9a38b877b67f0ac0ee4f58ed50983
2006.0/RPMS/xine-gnomevfs-1.1.0-9.6.20060mdk.i586.rpm
8656ea92b3fca51e2fad861ea963b14d
2006.0/RPMS/xine-image-1.1.0-9.6.20060mdk.i586.rpm
6a538ee35d785dfc7ea64a03c20060da
2006.0/RPMS/xine-plugins-1.1.0-9.6.20060mdk.i586.rpm
9defa64950f2feebab9dda16d35523cb
2006.0/RPMS/xine-polyp-1.1.0-9.6.20060mdk.i586.rpm
d207307cb338b46edd703797b693ea24
2006.0/RPMS/xine-smb-1.1.0-9.6.20060mdk.i586.rpm
4dc1623162c6092eb10c755ed2c5366a
2006.0/SRPMS/xine-lib-1.1.0-9.6.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
8798915891b79ac134565f8ede0653b1
x86_64/2006.0/RPMS/lib64xine1-1.1.0-9.6.20060mdk.x86_64.rpm
dcd2eb828f921b04206124835eeada8e
x86_64/2006.0/RPMS/lib64xine1-devel-1.1.0-9.6.20060mdk.x86_64.rpm

a933644c1c56d642a5d576cb217d0356
x86_64/2006.0/RPMS/xine-aa-1.1.0-9.6.20060mdk.x86_64.rpm
238d8526e618dff3aa31e223c14ce432
x86_64/2006.0/RPMS/xine-arts-1.1.0-9.6.20060mdk.x86_64.rpm
d9f0269ae701936ce27b6515e5c73ac1
x86_64/2006.0/RPMS/xine-dxr3-1.1.0-9.6.20060mdk.x86_64.rpm
4683507048ec6535c2c5f63997ec719d
x86_64/2006.0/RPMS/xine-esd-1.1.0-9.6.20060mdk.x86_64.rpm
bc649ad82f11c8422f1e9fb711dd4803
x86_64/2006.0/RPMS/xine-flac-1.1.0-9.6.20060mdk.x86_64.rpm
52fe1d4ddeeea6ec91a776ccacf5df19
x86_64/2006.0/RPMS/xine-gnomevfs-1.1.0-9.6.20060mdk.x86_64.rpm
348cc9ecf59e378b3d1c6aa12a35f9b9
x86_64/2006.0/RPMS/xine-image-1.1.0-9.6.20060mdk.x86_64.rpm
d2f2300e0bd4e4e210bbfae485c07624
x86_64/2006.0/RPMS/xine-plugins-1.1.0-9.6.20060mdk.x86_64.rpm
afca19bc708fc5964c19fff3a2d16286
x86_64/2006.0/RPMS/xine-polyp-1.1.0-9.6.20060mdk.x86_64.rpm
ba7c60488a4459066ba4ed08046ce48c
x86_64/2006.0/RPMS/xine-smb-1.1.0-9.6.20060mdk.x86_64.rpm
4dc1623162c6092eb10c755ed2c5366a
x86_64/2006.0/SRPMS/xine-lib-1.1.0-9.6.20060mdk.src.rpm

Corporate 3.0:
1390c15ca893041af1076e6a02d14f47
corporate/3.0/RPMS/libxine1-1-0.rc3.6.12.C30mdk.i586.rpm
ecc53b859629edd48ef27b477332889e
corporate/3.0/RPMS/libxine1-devel-1-0.rc3.6.12.C30mdk.i586.rpm
a4d85795d05266793fa61ba6bc986aa6
corporate/3.0/RPMS/xine-aa-1-0.rc3.6.12.C30mdk.i586.rpm
4dd4249d6b1911501ddcfa1ef36470af
corporate/3.0/RPMS/xine-arts-1-0.rc3.6.12.C30mdk.i586.rpm
c9a3f82dad17f32a6ab6c0b1926c52c1
corporate/3.0/RPMS/xine-dxr3-1-0.rc3.6.12.C30mdk.i586.rpm
c40b65dd7cde826b8bfa5fb5720d15ed
corporate/3.0/RPMS/xine-esd-1-0.rc3.6.12.C30mdk.i586.rpm
2a257f092fe4b304be7e358230aa0361
corporate/3.0/RPMS/xine-flac-1-0.rc3.6.12.C30mdk.i586.rpm
b04b482c8693272f7ead71ac3ce91e7f
corporate/3.0/RPMS/xine-gnomevfs-1-0.rc3.6.12.C30mdk.i586.rpm
ae63549d198004056aacacee5b2ccbef
corporate/3.0/RPMS/xine-plugins-1-0.rc3.6.12.C30mdk.i586.rpm
d8fe8f9dff1190413e81e82e67762462
corporate/3.0/SRPMS/xine-lib-1-0.rc3.6.12.C30mdk.src.rpm

Corporate 3.0/X86_64:
aad2ac9345e05d900910b8beade5ff21
x86_64/corporate/3.0/RPMS/lib64xine1-1-0.rc3.6.12.C30mdk.x86_64.rpm

b9540819f0250a2924297ce0388f6202
x86_64/corporate/3.0/RPMS/lib64xine1-devel-1-0.rc3.6.12.C30mdk.x86_64.rpm

53cc9dc911be64bf8764d76262df4a44
x86_64/corporate/3.0/RPMS/xine-aa-1-0.rc3.6.12.C30mdk.x86_64.rpm

280b7a7ceb168225d30eb97e95f45fb6
x86_64/corporate/3.0/RPMS/xine-arts-1-0.rc3.6.12.C30mdk.x86_64.rpm

4e3811096df50e37e6b10f3eedafb0be
x86_64/corporate/3.0/RPMS/xine-esd-1-0.rc3.6.12.C30mdk.x86_64.rpm

e1e703b0f81edc6399225c6652049519
x86_64/corporate/3.0/RPMS/xine-flac-1-0.rc3.6.12.C30mdk.x86_64.rpm

14ce60de521e86ae7755c74a3c845d73
x86_64/corporate/3.0/RPMS/xine-gnomevfs-1-0.rc3.6.12.C30mdk.x86_64.rpm

f95f6a3222ef533ea13637cd8d9ff737
x86_64/corporate/3.0/RPMS/xine-plugins-1-0.rc3.6.12.C30mdk.x86_64.rpm

d8fe8f9dff1190413e81e82e67762462
x86_64/corporate/3.0/SRPMS/xine-lib-1-0.rc3.6.12.C30mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.

All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: vixie-cron security update
Advisory ID: RHSA-2006:0539-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0539.html

Issue date: 2006-07-12
Updated on: 2006-07-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-2607


1. Summary:

Updated vixie-cron packages that fix a privilege escalation
issue are now available.

This update has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

The vixie-cron package contains the Vixie version of cron. Cron
is a standard UNIX daemon that runs specified programs at scheduled
times.

A privilege escalation flaw was found in the way Vixie Cron runs
programs; vixie-cron does not properly verify an attempt to set the
current process user id succeeded. It was possible for a malicious
local users who exhausted certain limits to execute arbitrary
commands as root via cron. (CVE-2006-2607)

All users of vixie-cron should upgrade to these updated
packages, which contain a backported patch to correct this
issue.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

193146 – CVE-2006-2607 Jobs start from root when pam_limits
enabled

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/vixie-cron-4.1-44.EL4.src.rpm

84ffd65a8877af47400a731ecd1b9ee3
vixie-cron-4.1-44.EL4.src.rpm

i386:
96f8e56c7683001feb3f3af160e5d3bc
vixie-cron-4.1-44.EL4.i386.rpm
2537c3d0066bfba10e271466e848abfa

vixie-cron-debuginfo-4.1-44.EL4.i386.rpm

ia64:
a8d8d2c094a1d9aa1e8b565633f63491
vixie-cron-4.1-44.EL4.ia64.rpm
fbd4dd6bda2c2b4ed0b76b9decc45da8

vixie-cron-debuginfo-4.1-44.EL4.ia64.rpm

ppc:
abbfe3611ef001871714d508cb12ee78
vixie-cron-4.1-44.EL4.ppc.rpm
cfff4b167fa6cf2f1c093c9d990fea1d

vixie-cron-debuginfo-4.1-44.EL4.ppc.rpm

s390:
13a5b37c0c9c360055a75c3b779603c9
vixie-cron-4.1-44.EL4.s390.rpm
5eddcab5c828098a1fd2e4cdd1c1ddc1

vixie-cron-debuginfo-4.1-44.EL4.s390.rpm

s390x:
869131c337de109964f8acb2e720ee33
vixie-cron-4.1-44.EL4.s390x.rpm
32da5254a3b569a351557547fc872556

vixie-cron-debuginfo-4.1-44.EL4.s390x.rpm

x86_64:
3d045241d3453e8bc5a6bc260320fbc9
vixie-cron-4.1-44.EL4.x86_64.rpm
2d30b0141ee8e242602fa70f03982713

vixie-cron-debuginfo-4.1-44.EL4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/vixie-cron-4.1-44.EL4.src.rpm

84ffd65a8877af47400a731ecd1b9ee3
vixie-cron-4.1-44.EL4.src.rpm

i386:
96f8e56c7683001feb3f3af160e5d3bc
vixie-cron-4.1-44.EL4.i386.rpm
2537c3d0066bfba10e271466e848abfa

vixie-cron-debuginfo-4.1-44.EL4.i386.rpm

x86_64:
3d045241d3453e8bc5a6bc260320fbc9
vixie-cron-4.1-44.EL4.x86_64.rpm
2d30b0141ee8e242602fa70f03982713

vixie-cron-debuginfo-4.1-44.EL4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/vixie-cron-4.1-44.EL4.src.rpm

84ffd65a8877af47400a731ecd1b9ee3
vixie-cron-4.1-44.EL4.src.rpm

i386:
96f8e56c7683001feb3f3af160e5d3bc
vixie-cron-4.1-44.EL4.i386.rpm
2537c3d0066bfba10e271466e848abfa

vixie-cron-debuginfo-4.1-44.EL4.i386.rpm

ia64:
a8d8d2c094a1d9aa1e8b565633f63491
vixie-cron-4.1-44.EL4.ia64.rpm
fbd4dd6bda2c2b4ed0b76b9decc45da8

vixie-cron-debuginfo-4.1-44.EL4.ia64.rpm

x86_64:
3d045241d3453e8bc5a6bc260320fbc9
vixie-cron-4.1-44.EL4.x86_64.rpm
2d30b0141ee8e242602fa70f03982713

vixie-cron-debuginfo-4.1-44.EL4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/vixie-cron-4.1-44.EL4.src.rpm

84ffd65a8877af47400a731ecd1b9ee3
vixie-cron-4.1-44.EL4.src.rpm

i386:
96f8e56c7683001feb3f3af160e5d3bc
vixie-cron-4.1-44.EL4.i386.rpm
2537c3d0066bfba10e271466e848abfa

vixie-cron-debuginfo-4.1-44.EL4.i386.rpm

ia64:
a8d8d2c094a1d9aa1e8b565633f63491
vixie-cron-4.1-44.EL4.ia64.rpm
fbd4dd6bda2c2b4ed0b76b9decc45da8

vixie-cron-debuginfo-4.1-44.EL4.ia64.rpm

x86_64:
3d045241d3453e8bc5a6bc260320fbc9
vixie-cron-4.1-44.EL4.x86_64.rpm
2d30b0141ee8e242602fa70f03982713

vixie-cron-debuginfo-4.1-44.EL4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://www.redhat.com/security/updates/classification/#important

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Moderate: php security update
Advisory ID: RHSA-2006:0568-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0568.html

Issue date: 2006-07-12
Updated on: 2006-07-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-1494 CVE-2006-1990 CVE-2006-3017


1. Summary:

Updated PHP packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having moderate security impact by
the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

PHP is an HTML-embedded scripting language commonly used with
the Apache HTTP Web server.

A directory traversal vulnerability was found in PHP. Local
users could bypass open_basedir restrictions allowing remote
attackers to create files in arbitrary directories via the
tempnam() function. (CVE-2006-1494)

The wordwrap() PHP function did not properly check for integer
overflow in the handling of the “break” parameter. An attacker who
could control the string passed to the “break” parameter could
cause a heap overflow. (CVE-2006-1990)

A flaw was found in the zend_hash_del() PHP function. For PHP
scripts that rely on the use of the unset() function, a remote
attacker could force variable initialization to be bypassed. This
would be a security issue particularly for installations that
enable the “register_globals” setting. “register_globals” is
disabled by default in Red Hat Enterprise Linux.
(CVE-2006-3017)

Users of PHP should upgrade to these updated packages, which
contain backported patches that resolve these issues.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

189591 – CVE-2006-1494 PHP tempname open_basedir issue
190033 – CVE-2006-1990 wordwrap integer overflow
196256 – CVE-2006-3017 zend_hash_del bug

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/php-4.3.2-33.ent.src.rpm

c018cc410c9655f537bbc617ec67ba11
php-4.3.2-33.ent.src.rpm

i386:
d5c4ee398126667a3d38ca3b3ac9d949 php-4.3.2-33.ent.i386.rpm
193ab3af5edc67f1c99fb955b00102da

php-debuginfo-4.3.2-33.ent.i386.rpm
d33d058957d18a82d02634e71be9c1ae
php-devel-4.3.2-33.ent.i386.rpm
10e154d24fbd4a57731902ce2f038a74

php-imap-4.3.2-33.ent.i386.rpm
8701231a24864316cedeaef756926771
php-ldap-4.3.2-33.ent.i386.rpm
51de6e91de61dbb536089a3f3bc15471

php-mysql-4.3.2-33.ent.i386.rpm
c30922c2ff54ae24f6c5efa318ad3f62
php-odbc-4.3.2-33.ent.i386.rpm
87e7856bf30f33d540a2a2e3fc58dd9e

php-pgsql-4.3.2-33.ent.i386.rpm

ia64:
ea9878b8678de65636f76ad6d937603d php-4.3.2-33.ent.ia64.rpm
e3cceb5006b0a629eb1026cc79a9d2cc

php-debuginfo-4.3.2-33.ent.ia64.rpm
bad9909488a7c61e2a5dbf9a6b84e639
php-devel-4.3.2-33.ent.ia64.rpm
8180a9da60367868236a6f0db5d96402

php-imap-4.3.2-33.ent.ia64.rpm
27b9b7b4e0171ca0e9f438819d38f7fd
php-ldap-4.3.2-33.ent.ia64.rpm
2635ed5ac5ec737ac18fde4a99ca6807

php-mysql-4.3.2-33.ent.ia64.rpm
9f79cd8ac13ccddcecd140b5fa3d92b2
php-odbc-4.3.2-33.ent.ia64.rpm
59fd4963632105e568292d9fb6a35820

php-pgsql-4.3.2-33.ent.ia64.rpm

ppc:
35582367f1958335fe2d13585460e6e1 php-4.3.2-33.ent.ppc.rpm
ca1a7b0361440c2157e29331fe6f7f20

php-debuginfo-4.3.2-33.ent.ppc.rpm
a24707e275c345129babbd9c734dc848
php-devel-4.3.2-33.ent.ppc.rpm
113ff33af6db3fc10ceaf94f598ef858

php-imap-4.3.2-33.ent.ppc.rpm
f69c5b8debe3ee9bbd49bc6763f562b9
php-ldap-4.3.2-33.ent.ppc.rpm
d7839788a852cc6a0237aed3b94f64af

php-mysql-4.3.2-33.ent.ppc.rpm
a62fbd02a3642f3bbbc4df9f970bd6af
php-odbc-4.3.2-33.ent.ppc.rpm
a8efdd969dc9b1b5ddc2b4fbe6b205a0

php-pgsql-4.3.2-33.ent.ppc.rpm

s390:
e3e994c07c6e53b1fee13de2ea1d26df php-4.3.2-33.ent.s390.rpm
bfca477b7cf692bad01b461bb11db22c

php-debuginfo-4.3.2-33.ent.s390.rpm
2a7a2ed6888e1583bc98cf5de0639a8b
php-devel-4.3.2-33.ent.s390.rpm
a4a4742f2dce74e19d579ccfcb587823

php-imap-4.3.2-33.ent.s390.rpm
0377b6da4e91b804d61567375bfd39fa
php-ldap-4.3.2-33.ent.s390.rpm
670c1246c25be44ae0885241624fc084

php-mysql-4.3.2-33.ent.s390.rpm
c0c615cb9e9b402cb209bd363d80c8b2
php-odbc-4.3.2-33.ent.s390.rpm
05064d39c5a5e7489511d7a1bc64332d

php-pgsql-4.3.2-33.ent.s390.rpm

s390x:
eee835eb080c99fd6ad6a62eefaeec6a php-4.3.2-33.ent.s390x.rpm
95876dbc895c0c30405a9fa3a58d84c2

php-debuginfo-4.3.2-33.ent.s390x.rpm
88f9c171b9b3ed332222b7d2ee1e7cd6
php-devel-4.3.2-33.ent.s390x.rpm
37983d3e6a850a106dc5e9afd2acbfb9

php-imap-4.3.2-33.ent.s390x.rpm
c33c35b1df87c9f716ce1ba1aff110ee
php-ldap-4.3.2-33.ent.s390x.rpm
e9775947d81ae5d20258b1a16f43533a

php-mysql-4.3.2-33.ent.s390x.rpm
53c963377e4bb04ac44e98d48f88be3c
php-odbc-4.3.2-33.ent.s390x.rpm
3cdd9b2a3628d9fbe6419f09afb963f2

php-pgsql-4.3.2-33.ent.s390x.rpm

x86_64:
aba5c8d6b64ce23a3c596d623bbf70ce php-4.3.2-33.ent.x86_64.rpm
8bac277f71bf873c0bcb3684b24a2dd5

php-debuginfo-4.3.2-33.ent.x86_64.rpm
a127c84f015c9754238aa6e403890152
php-devel-4.3.2-33.ent.x86_64.rpm
fb9c4d54c9ee78f63dcb9378e0b0e761

php-imap-4.3.2-33.ent.x86_64.rpm
fbaecf21159a78c9a747c326d38b1c35
php-ldap-4.3.2-33.ent.x86_64.rpm
b1492c3d00e6db5a9b727f3643d49608

php-mysql-4.3.2-33.ent.x86_64.rpm
5bf58b38b0d5a66aba0e176a7ffb6ab0
php-odbc-4.3.2-33.ent.x86_64.rpm
c83f9932e1d75c913a405e7f062683bc

php-pgsql-4.3.2-33.ent.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/php-4.3.2-33.ent.src.rpm

c018cc410c9655f537bbc617ec67ba11
php-4.3.2-33.ent.src.rpm

i386:
d5c4ee398126667a3d38ca3b3ac9d949 php-4.3.2-33.ent.i386.rpm
193ab3af5edc67f1c99fb955b00102da

php-debuginfo-4.3.2-33.ent.i386.rpm
d33d058957d18a82d02634e71be9c1ae
php-devel-4.3.2-33.ent.i386.rpm
10e154d24fbd4a57731902ce2f038a74

php-imap-4.3.2-33.ent.i386.rpm
8701231a24864316cedeaef756926771
php-ldap-4.3.2-33.ent.i386.rpm
51de6e91de61dbb536089a3f3bc15471

php-mysql-4.3.2-33.ent.i386.rpm
c30922c2ff54ae24f6c5efa318ad3f62
php-odbc-4.3.2-33.ent.i386.rpm
87e7856bf30f33d540a2a2e3fc58dd9e

php-pgsql-4.3.2-33.ent.i386.rpm

x86_64:
aba5c8d6b64ce23a3c596d623bbf70ce php-4.3.2-33.ent.x86_64.rpm
8bac277f71bf873c0bcb3684b24a2dd5

php-debuginfo-4.3.2-33.ent.x86_64.rpm
a127c84f015c9754238aa6e403890152
php-devel-4.3.2-33.ent.x86_64.rpm
fb9c4d54c9ee78f63dcb9378e0b0e761

php-imap-4.3.2-33.ent.x86_64.rpm
fbaecf21159a78c9a747c326d38b1c35
php-ldap-4.3.2-33.ent.x86_64.rpm
b1492c3d00e6db5a9b727f3643d49608

php-mysql-4.3.2-33.ent.x86_64.rpm
5bf58b38b0d5a66aba0e176a7ffb6ab0
php-odbc-4.3.2-33.ent.x86_64.rpm
c83f9932e1d75c913a405e7f062683bc

php-pgsql-4.3.2-33.ent.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/php-4.3.2-33.ent.src.rpm

c018cc410c9655f537bbc617ec67ba11
php-4.3.2-33.ent.src.rpm

i386:
d5c4ee398126667a3d38ca3b3ac9d949 php-4.3.2-33.ent.i386.rpm
193ab3af5edc67f1c99fb955b00102da

php-debuginfo-4.3.2-33.ent.i386.rpm
d33d058957d18a82d02634e71be9c1ae
php-devel-4.3.2-33.ent.i386.rpm
10e154d24fbd4a57731902ce2f038a74

php-imap-4.3.2-33.ent.i386.rpm
8701231a24864316cedeaef756926771
php-ldap-4.3.2-33.ent.i386.rpm
51de6e91de61dbb536089a3f3bc15471

php-mysql-4.3.2-33.ent.i386.rpm
c30922c2ff54ae24f6c5efa318ad3f62
php-odbc-4.3.2-33.ent.i386.rpm
87e7856bf30f33d540a2a2e3fc58dd9e

php-pgsql-4.3.2-33.ent.i386.rpm

ia64:
ea9878b8678de65636f76ad6d937603d php-4.3.2-33.ent.ia64.rpm
e3cceb5006b0a629eb1026cc79a9d2cc

php-debuginfo-4.3.2-33.ent.ia64.rpm
bad9909488a7c61e2a5dbf9a6b84e639
php-devel-4.3.2-33.ent.ia64.rpm
8180a9da60367868236a6f0db5d96402

php-imap-4.3.2-33.ent.ia64.rpm
27b9b7b4e0171ca0e9f438819d38f7fd
php-ldap-4.3.2-33.ent.ia64.rpm
2635ed5ac5ec737ac18fde4a99ca6807

php-mysql-4.3.2-33.ent.ia64.rpm
9f79cd8ac13ccddcecd140b5fa3d92b2
php-odbc-4.3.2-33.ent.ia64.rpm
59fd4963632105e568292d9fb6a35820

php-pgsql-4.3.2-33.ent.ia64.rpm

x86_64:
aba5c8d6b64ce23a3c596d623bbf70ce php-4.3.2-33.ent.x86_64.rpm
8bac277f71bf873c0bcb3684b24a2dd5

php-debuginfo-4.3.2-33.ent.x86_64.rpm
a127c84f015c9754238aa6e403890152
php-devel-4.3.2-33.ent.x86_64.rpm
fb9c4d54c9ee78f63dcb9378e0b0e761

php-imap-4.3.2-33.ent.x86_64.rpm
fbaecf21159a78c9a747c326d38b1c35
php-ldap-4.3.2-33.ent.x86_64.rpm
b1492c3d00e6db5a9b727f3643d49608

php-mysql-4.3.2-33.ent.x86_64.rpm
5bf58b38b0d5a66aba0e176a7ffb6ab0
php-odbc-4.3.2-33.ent.x86_64.rpm
c83f9932e1d75c913a405e7f062683bc

php-pgsql-4.3.2-33.ent.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/php-4.3.2-33.ent.src.rpm

c018cc410c9655f537bbc617ec67ba11
php-4.3.2-33.ent.src.rpm

i386:
d5c4ee398126667a3d38ca3b3ac9d949 php-4.3.2-33.ent.i386.rpm
193ab3af5edc67f1c99fb955b00102da

php-debuginfo-4.3.2-33.ent.i386.rpm
d33d058957d18a82d02634e71be9c1ae
php-devel-4.3.2-33.ent.i386.rpm
10e154d24fbd4a57731902ce2f038a74

php-imap-4.3.2-33.ent.i386.rpm
8701231a24864316cedeaef756926771
php-ldap-4.3.2-33.ent.i386.rpm
51de6e91de61dbb536089a3f3bc15471

php-mysql-4.3.2-33.ent.i386.rpm
c30922c2ff54ae24f6c5efa318ad3f62
php-odbc-4.3.2-33.ent.i386.rpm
87e7856bf30f33d540a2a2e3fc58dd9e

php-pgsql-4.3.2-33.ent.i386.rpm

ia64:
ea9878b8678de65636f76ad6d937603d php-4.3.2-33.ent.ia64.rpm
e3cceb5006b0a629eb1026cc79a9d2cc

php-debuginfo-4.3.2-33.ent.ia64.rpm
bad9909488a7c61e2a5dbf9a6b84e639
php-devel-4.3.2-33.ent.ia64.rpm
8180a9da60367868236a6f0db5d96402

php-imap-4.3.2-33.ent.ia64.rpm
27b9b7b4e0171ca0e9f438819d38f7fd
php-ldap-4.3.2-33.ent.ia64.rpm
2635ed5ac5ec737ac18fde4a99ca6807

php-mysql-4.3.2-33.ent.ia64.rpm
9f79cd8ac13ccddcecd140b5fa3d92b2
php-odbc-4.3.2-33.ent.ia64.rpm
59fd4963632105e568292d9fb6a35820

php-pgsql-4.3.2-33.ent.ia64.rpm

x86_64:
aba5c8d6b64ce23a3c596d623bbf70ce php-4.3.2-33.ent.x86_64.rpm
8bac277f71bf873c0bcb3684b24a2dd5

php-debuginfo-4.3.2-33.ent.x86_64.rpm
a127c84f015c9754238aa6e403890152
php-devel-4.3.2-33.ent.x86_64.rpm
fb9c4d54c9ee78f63dcb9378e0b0e761

php-imap-4.3.2-33.ent.x86_64.rpm
fbaecf21159a78c9a747c326d38b1c35
php-ldap-4.3.2-33.ent.x86_64.rpm
b1492c3d00e6db5a9b727f3643d49608

php-mysql-4.3.2-33.ent.x86_64.rpm
5bf58b38b0d5a66aba0e176a7ffb6ab0
php-odbc-4.3.2-33.ent.x86_64.rpm
c83f9932e1d75c913a405e7f062683bc

php-pgsql-4.3.2-33.ent.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/php-4.3.9-3.15.src.rpm

8e7fcb8213f940460bed98ea4845b008 php-4.3.9-3.15.src.rpm

i386:
b3feb153604a4759ea9a7c90dadeade8 php-4.3.9-3.15.i386.rpm
99645c0bb650a1202ef5a6ac4c3dafdf

php-debuginfo-4.3.9-3.15.i386.rpm
f0cc982f65019dd52aa8e636c08cbf55
php-devel-4.3.9-3.15.i386.rpm
9b29e28848067eed3229d7cc3e586427

php-domxml-4.3.9-3.15.i386.rpm
21203f5cde359468796ef6d58ee90278 php-gd-4.3.9-3.15.i386.rpm
547b30e0bfae2d50914b09e472c2a727

php-imap-4.3.9-3.15.i386.rpm
c5a6be773ce7bfd9235b8fdab4b0b39f
php-ldap-4.3.9-3.15.i386.rpm
90fba6d1c1a33a2f748411c5edf375ba

php-mbstring-4.3.9-3.15.i386.rpm
700ef656f11b712891ca92b2dda910f7
php-mysql-4.3.9-3.15.i386.rpm
49da8fce4fe283f0015b9690d01a6f2d

php-ncurses-4.3.9-3.15.i386.rpm
d76fb272aa599f28e65bc2848bdadce4
php-odbc-4.3.9-3.15.i386.rpm
d12a1760a3a561aabd7778033faaafa7

php-pear-4.3.9-3.15.i386.rpm
3b332648ef656f75e1ac8d91f96967ef
php-pgsql-4.3.9-3.15.i386.rpm
96f03c0c5ad3a6106944a39061f6c13f

php-snmp-4.3.9-3.15.i386.rpm
96845abc69545864059b172a1a7ff82d
php-xmlrpc-4.3.9-3.15.i386.rpm

ia64:
bb521451c677d32b3824349beb72091a php-4.3.9-3.15.ia64.rpm
e2cb7a211227c7d863a833de65efbe7a

php-debuginfo-4.3.9-3.15.ia64.rpm
9a854ab664a15e832a9ce7709f96eca4
php-devel-4.3.9-3.15.ia64.rpm
d93b129c85b7c2e8e78f0e57d32abcbc

php-domxml-4.3.9-3.15.ia64.rpm
c8f585dd6f927afe8e2f723fd97643cf php-gd-4.3.9-3.15.ia64.rpm
a77f66b188d9f62ffd6e03a041aadd2a

php-imap-4.3.9-3.15.ia64.rpm
a306d26654b2ad08bd0a11c36fca23a1
php-ldap-4.3.9-3.15.ia64.rpm
a42e38ee78744222fdc1a1bb52b61de3

php-mbstring-4.3.9-3.15.ia64.rpm
97076014c9000997a555577b2d1f13ef
php-mysql-4.3.9-3.15.ia64.rpm
7fdd2fe3ce37b896f3542d8e3bb62dc9

php-ncurses-4.3.9-3.15.ia64.rpm
f5fb5c9e489b3205a77eb43e9d794f59
php-odbc-4.3.9-3.15.ia64.rpm
888b095ced3b5058a5a2ef3f28fdc0bf

php-pear-4.3.9-3.15.ia64.rpm
81de692b7a65b49905acbbc15923a969
php-pgsql-4.3.9-3.15.ia64.rpm
248e58b4de5ce83a3a03c177ab7782a9

php-snmp-4.3.9-3.15.ia64.rpm
f9fb2eac36fccecea0d95e45680dce7a
php-xmlrpc-4.3.9-3.15.ia64.rpm

ppc:
4ae4ed5ad7f26a87a8b6ac4b272a12d5 php-4.3.9-3.15.ppc.rpm
4fab4951889558a732f9cabc87dcc8a5

php-debuginfo-4.3.9-3.15.ppc.rpm
93e504a0669cd5a46135d2026d725dea
php-devel-4.3.9-3.15.ppc.rpm
39ce65d06617224939f451bedd716091

php-domxml-4.3.9-3.15.ppc.rpm
d4b49b4ee7241db76f956360d3a703ec php-gd-4.3.9-3.15.ppc.rpm
53d98aacc4651d08091b0e642cbbbb18

php-imap-4.3.9-3.15.ppc.rpm
19aa451035988c922b68fe7fd711ae47 php-ldap-4.3.9-3.15.ppc.rpm
b9b0084f4d2a658afef7f677923b4cc2

php-mbstring-4.3.9-3.15.ppc.rpm
3b93c624d1f2e1cf36dad34a83a339f1
php-mysql-4.3.9-3.15.ppc.rpm
64117e7600fb800b0ee722b72a09aa96

php-ncurses-4.3.9-3.15.ppc.rpm
a7ac1643c369601544657a70701c4464 php-odbc-4.3.9-3.15.ppc.rpm
f002ab3a25a6f8c2a4d5e7eb8723db7e

php-pear-4.3.9-3.15.ppc.rpm
060120ab15e3655fa88c764227305783
php-pgsql-4.3.9-3.15.ppc.rpm
20203aa8a389cbe47ef8ec6ce5b4ffc3

php-snmp-4.3.9-3.15.ppc.rpm
7b7fdb0864f9af8ff98f6ba8e5a25e07
php-xmlrpc-4.3.9-3.15.ppc.rpm

s390:
b36b0621ec0d19fabe534c17553d11e3 php-4.3.9-3.15.s390.rpm
3db657e3c9f8382aa78a38fa2d0abc75

php-debuginfo-4.3.9-3.15.s390.rpm
afcb3bc23dfcbe95b1aa6efb3cc96e95
php-devel-4.3.9-3.15.s390.rpm
a311fd4be49635be96c07431d27019b7

php-domxml-4.3.9-3.15.s390.rpm
e1740411b92e05e938e236769923d1a1 php-gd-4.3.9-3.15.s390.rpm
3b82e31d824b26c76e5e821c31433c7e

php-imap-4.3.9-3.15.s390.rpm
ca04837a8f505ab3e4dfa07f3e7f767b
php-ldap-4.3.9-3.15.s390.rpm
9b466230f5c2eddc2c10de1eaab3003f

php-mbstring-4.3.9-3.15.s390.rpm
699264efb4723e16218f52f198e9efb9
php-mysql-4.3.9-3.15.s390.rpm
e49fdce3a6a0863328f8053460467ab1

php-ncurses-4.3.9-3.15.s390.rpm
aa4c1b421abb39258b1a47d2a3dc0d0c
php-odbc-4.3.9-3.15.s390.rpm
a8a31b08ebad23ebd8b4c113eda2eb92

php-pear-4.3.9-3.15.s390.rpm
a7ca82081f6ccbd848f9df066e4f5542
php-pgsql-4.3.9-3.15.s390.rpm
ebe13bdf4f12fc2c35ba6c633aa896de

php-snmp-4.3.9-3.15.s390.rpm
9b05f0df8613ccfc7009d94351752716
php-xmlrpc-4.3.9-3.15.s390.rpm

s390x:
a4278f9669cccc30ea99bddeffe818e1 php-4.3.9-3.15.s390x.rpm
354064c6ed2deddef764a888b9c0e753

php-debuginfo-4.3.9-3.15.s390x.rpm
572a0f4a2f14b77005f1e21f4581a612
php-devel-4.3.9-3.15.s390x.rpm
8eaeb14f3f78a4c6d4606effe0e48494

php-domxml-4.3.9-3.15.s390x.rpm
a9f4b609176f9e3203c35b1191f3345c php-gd-4.3.9-3.15.s390x.rpm
c870a007811d74d34c6e1bb3fa675f76

php-imap-4.3.9-3.15.s390x.rpm
8c1fecc0f8c9a0c31e4fe2dcdeeca14c
php-ldap-4.3.9-3.15.s390x.rpm
6b8a83936454cf0b9279bb045e5c6fe2

php-mbstring-4.3.9-3.15.s390x.rpm
21a09d060995c5ceb76e006e0544d530
php-mysql-4.3.9-3.15.s390x.rpm
65caaa12a59d196c83b5900903deac9f

php-ncurses-4.3.9-3.15.s390x.rpm
726f026c51a187a4ceb4c61572a959d4
php-odbc-4.3.9-3.15.s390x.rpm
e29b5fc168e080c4e63588f691750e88

php-pear-4.3.9-3.15.s390x.rpm
328a3493eb37105ef0b88ddc66959734
php-pgsql-4.3.9-3.15.s390x.rpm
d58730f86fb8063ca7259a3c8bc2cf1b

php-snmp-4.3.9-3.15.s390x.rpm
fc7dd30602047765aa171ead439a2146
php-xmlrpc-4.3.9-3.15.s390x.rpm

x86_64:
eef5025da3ae88d290fc4ea7912f188d php-4.3.9-3.15.x86_64.rpm
d70d29f4a8f4de2737446fe166740735

php-debuginfo-4.3.9-3.15.x86_64.rpm
cbec1631a86b07709cca28258b4d3103
php-devel-4.3.9-3.15.x86_64.rpm
d0bc99f8cf1a936bdd2ebb0f3ca2bf9f

php-domxml-4.3.9-3.15.x86_64.rpm
90a8ffe9300be426e39d61716199da8b
php-gd-4.3.9-3.15.x86_64.rpm
2ccfc1f616ae13c45217e1a7afe41028

php-imap-4.3.9-3.15.x86_64.rpm
3b4264695e7278eee9fb8411c4e90e96
php-ldap-4.3.9-3.15.x86_64.rpm
a729d490b1b75691c10fe26996817096

php-mbstring-4.3.9-3.15.x86_64.rpm
6e43b892dcfa284d83a3f1b00feabaf9
php-mysql-4.3.9-3.15.x86_64.rpm
b949131046558d1a6b82c0fab860f0d9

php-ncurses-4.3.9-3.15.x86_64.rpm
9235dce05195d560a3c478796f6783ab
php-odbc-4.3.9-3.15.x86_64.rpm
bf18f80b06d7cbae0d962ab07f248ba6

php-pear-4.3.9-3.15.x86_64.rpm
9fd490cc180ef31c190e8385d0e0ce89
php-pgsql-4.3.9-3.15.x86_64.rpm
2f9c58c5a667f7f6fae643a2ef4a5380

php-snmp-4.3.9-3.15.x86_64.rpm
ea37846f2ae7d14c3fb163f6be22802d
php-xmlrpc-4.3.9-3.15.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/php-4.3.9-3.15.src.rpm

8e7fcb8213f940460bed98ea4845b008 php-4.3.9-3.15.src.rpm

i386:
b3feb153604a4759ea9a7c90dadeade8 php-4.3.9-3.15.i386.rpm
99645c0bb650a1202ef5a6ac4c3dafdf

php-debuginfo-4.3.9-3.15.i386.rpm
f0cc982f65019dd52aa8e636c08cbf55
php-devel-4.3.9-3.15.i386.rpm
9b29e28848067eed3229d7cc3e586427

php-domxml-4.3.9-3.15.i386.rpm
21203f5cde359468796ef6d58ee90278 php-gd-4.3.9-3.15.i386.rpm
547b30e0bfae2d50914b09e472c2a727

php-imap-4.3.9-3.15.i386.rpm
c5a6be773ce7bfd9235b8fdab4b0b39f
php-ldap-4.3.9-3.15.i386.rpm
90fba6d1c1a33a2f748411c5edf375ba

php-mbstring-4.3.9-3.15.i386.rpm
700ef656f11b712891ca92b2dda910f7
php-mysql-4.3.9-3.15.i386.rpm
49da8fce4fe283f0015b9690d01a6f2d

php-ncurses-4.3.9-3.15.i386.rpm
d76fb272aa599f28e65bc2848bdadce4
php-odbc-4.3.9-3.15.i386.rpm
d12a1760a3a561aabd7778033faaafa7

php-pear-4.3.9-3.15.i386.rpm
3b332648ef656f75e1ac8d91f96967ef
php-pgsql-4.3.9-3.15.i386.rpm
96f03c0c5ad3a6106944a39061f6c13f

php-snmp-4.3.9-3.15.i386.rpm
96845abc69545864059b172a1a7ff82d
php-xmlrpc-4.3.9-3.15.i386.rpm

x86_64:
eef5025da3ae88d290fc4ea7912f188d php-4.3.9-3.15.x86_64.rpm
d70d29f4a8f4de2737446fe166740735

php-debuginfo-4.3.9-3.15.x86_64.rpm
cbec1631a86b07709cca28258b4d3103
php-devel-4.3.9-3.15.x86_64.rpm
d0bc99f8cf1a936bdd2ebb0f3ca2bf9f

php-domxml-4.3.9-3.15.x86_64.rpm
90a8ffe9300be426e39d61716199da8b
php-gd-4.3.9-3.15.x86_64.rpm
2ccfc1f616ae13c45217e1a7afe41028

php-imap-4.3.9-3.15.x86_64.rpm
3b4264695e7278eee9fb8411c4e90e96
php-ldap-4.3.9-3.15.x86_64.rpm
a729d490b1b75691c10fe26996817096

php-mbstring-4.3.9-3.15.x86_64.rpm
6e43b892dcfa284d83a3f1b00feabaf9
php-mysql-4.3.9-3.15.x86_64.rpm
b949131046558d1a6b82c0fab860f0d9

php-ncurses-4.3.9-3.15.x86_64.rpm
9235dce05195d560a3c478796f6783ab
php-odbc-4.3.9-3.15.x86_64.rpm
bf18f80b06d7cbae0d962ab07f248ba6

php-pear-4.3.9-3.15.x86_64.rpm
9fd490cc180ef31c190e8385d0e0ce89
php-pgsql-4.3.9-3.15.x86_64.rpm
2f9c58c5a667f7f6fae643a2ef4a5380

php-snmp-4.3.9-3.15.x86_64.rpm
ea37846f2ae7d14c3fb163f6be22802d
php-xmlrpc-4.3.9-3.15.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/php-4.3.9-3.15.src.rpm

8e7fcb8213f940460bed98ea4845b008 php-4.3.9-3.15.src.rpm

i386:
b3feb153604a4759ea9a7c90dadeade8 php-4.3.9-3.15.i386.rpm
99645c0bb650a1202ef5a6ac4c3dafdf

php-debuginfo-4.3.9-3.15.i386.rpm
f0cc982f65019dd52aa8e636c08cbf55
php-devel-4.3.9-3.15.i386.rpm
9b29e28848067eed3229d7cc3e586427

php-domxml-4.3.9-3.15.i386.rpm
21203f5cde359468796ef6d58ee90278 php-gd-4.3.9-3.15.i386.rpm
547b30e0bfae2d50914b09e472c2a727

php-imap-4.3.9-3.15.i386.rpm
c5a6be773ce7bfd9235b8fdab4b0b39f
php-ldap-4.3.9-3.15.i386.rpm
90fba6d1c1a33a2f748411c5edf375ba

php-mbstring-4.3.9-3.15.i386.rpm
700ef656f11b712891ca92b2dda910f7
php-mysql-4.3.9-3.15.i386.rpm
49da8fce4fe283f0015b9690d01a6f2d

php-ncurses-4.3.9-3.15.i386.rpm
d76fb272aa599f28e65bc2848bdadce4
php-odbc-4.3.9-3.15.i386.rpm
d12a1760a3a561aabd7778033faaafa7

php-pear-4.3.9-3.15.i386.rpm
3b332648ef656f75e1ac8d91f96967ef
php-pgsql-4.3.9-3.15.i386.rpm
96f03c0c5ad3a6106944a39061f6c13f

php-snmp-4.3.9-3.15.i386.rpm
96845abc69545864059b172a1a7ff82d
php-xmlrpc-4.3.9-3.15.i386.rpm

ia64:
bb521451c677d32b3824349beb72091a php-4.3.9-3.15.ia64.rpm
e2cb7a211227c7d863a833de65efbe7a

php-debuginfo-4.3.9-3.15.ia64.rpm
9a854ab664a15e832a9ce7709f96eca4
php-devel-4.3.9-3.15.ia64.rpm
d93b129c85b7c2e8e78f0e57d32abcbc

php-domxml-4.3.9-3.15.ia64.rpm
c8f585dd6f927afe8e2f723fd97643cf php-gd-4.3.9-3.15.ia64.rpm
a77f66b188d9f62ffd6e03a041aadd2a

php-imap-4.3.9-3.15.ia64.rpm
a306d26654b2ad08bd0a11c36fca23a1
php-ldap-4.3.9-3.15.ia64.rpm
a42e38ee78744222fdc1a1bb52b61de3

php-mbstring-4.3.9-3.15.ia64.rpm
97076014c9000997a555577b2d1f13ef
php-mysql-4.3.9-3.15.ia64.rpm
7fdd2fe3ce37b896f3542d8e3bb62dc9

php-ncurses-4.3.9-3.15.ia64.rpm
f5fb5c9e489b3205a77eb43e9d794f59
php-odbc-4.3.9-3.15.ia64.rpm
888b095ced3b5058a5a2ef3f28fdc0bf

php-pear-4.3.9-3.15.ia64.rpm
81de692b7a65b49905acbbc15923a969
php-pgsql-4.3.9-3.15.ia64.rpm
248e58b4de5ce83a3a03c177ab7782a9

php-snmp-4.3.9-3.15.ia64.rpm
f9fb2eac36fccecea0d95e45680dce7a
php-xmlrpc-4.3.9-3.15.ia64.rpm

x86_64:
eef5025da3ae88d290fc4ea7912f188d php-4.3.9-3.15.x86_64.rpm
d70d29f4a8f4de2737446fe166740735

php-debuginfo-4.3.9-3.15.x86_64.rpm
cbec1631a86b07709cca28258b4d3103
php-devel-4.3.9-3.15.x86_64.rpm
d0bc99f8cf1a936bdd2ebb0f3ca2bf9f

php-domxml-4.3.9-3.15.x86_64.rpm
90a8ffe9300be426e39d61716199da8b
php-gd-4.3.9-3.15.x86_64.rpm
2ccfc1f616ae13c45217e1a7afe41028

php-imap-4.3.9-3.15.x86_64.rpm
3b4264695e7278eee9fb8411c4e90e96
php-ldap-4.3.9-3.15.x86_64.rpm
a729d490b1b75691c10fe26996817096

php-mbstring-4.3.9-3.15.x86_64.rpm
6e43b892dcfa284d83a3f1b00feabaf9
php-mysql-4.3.9-3.15.x86_64.rpm
b949131046558d1a6b82c0fab860f0d9

php-ncurses-4.3.9-3.15.x86_64.rpm
9235dce05195d560a3c478796f6783ab
php-odbc-4.3.9-3.15.x86_64.rpm
bf18f80b06d7cbae0d962ab07f248ba6

php-pear-4.3.9-3.15.x86_64.rpm
9fd490cc180ef31c190e8385d0e0ce89
php-pgsql-4.3.9-3.15.x86_64.rpm
2f9c58c5a667f7f6fae643a2ef4a5380

php-snmp-4.3.9-3.15.x86_64.rpm
ea37846f2ae7d14c3fb163f6be22802d
php-xmlrpc-4.3.9-3.15.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/php-4.3.9-3.15.src.rpm

8e7fcb8213f940460bed98ea4845b008 php-4.3.9-3.15.src.rpm

i386:
b3feb153604a4759ea9a7c90dadeade8 php-4.3.9-3.15.i386.rpm
99645c0bb650a1202ef5a6ac4c3dafdf

php-debuginfo-4.3.9-3.15.i386.rpm
f0cc982f65019dd52aa8e636c08cbf55
php-devel-4.3.9-3.15.i386.rpm
9b29e28848067eed3229d7cc3e586427

php-domxml-4.3.9-3.15.i386.rpm
21203f5cde359468796ef6d58ee90278 php-gd-4.3.9-3.15.i386.rpm
547b30e0bfae2d50914b09e472c2a727

php-imap-4.3.9-3.15.i386.rpm
c5a6be773ce7bfd9235b8fdab4b0b39f
php-ldap-4.3.9-3.15.i386.rpm
90fba6d1c1a33a2f748411c5edf375ba

php-mbstring-4.3.9-3.15.i386.rpm
700ef656f11b712891ca92b2dda910f7
php-mysql-4.3.9-3.15.i386.rpm
49da8fce4fe283f0015b9690d01a6f2d

php-ncurses-4.3.9-3.15.i386.rpm
d76fb272aa599f28e65bc2848bdadce4
php-odbc-4.3.9-3.15.i386.rpm
d12a1760a3a561aabd7778033faaafa7

php-pear-4.3.9-3.15.i386.rpm
3b332648ef656f75e1ac8d91f96967ef
php-pgsql-4.3.9-3.15.i386.rpm
96f03c0c5ad3a6106944a39061f6c13f

php-snmp-4.3.9-3.15.i386.rpm
96845abc69545864059b172a1a7ff82d
php-xmlrpc-4.3.9-3.15.i386.rpm

ia64:
bb521451c677d32b3824349beb72091a php-4.3.9-3.15.ia64.rpm
e2cb7a211227c7d863a833de65efbe7a

php-debuginfo-4.3.9-3.15.ia64.rpm
9a854ab664a15e832a9ce7709f96eca4
php-devel-4.3.9-3.15.ia64.rpm
d93b129c85b7c2e8e78f0e57d32abcbc

php-domxml-4.3.9-3.15.ia64.rpm
c8f585dd6f927afe8e2f723fd97643cf php-gd-4.3.9-3.15.ia64.rpm
a77f66b188d9f62ffd6e03a041aadd2a

php-imap-4.3.9-3.15.ia64.rpm
a306d26654b2ad08bd0a11c36fca23a1
php-ldap-4.3.9-3.15.ia64.rpm
a42e38ee78744222fdc1a1bb52b61de3

php-mbstring-4.3.9-3.15.ia64.rpm
97076014c9000997a555577b2d1f13ef
php-mysql-4.3.9-3.15.ia64.rpm
7fdd2fe3ce37b896f3542d8e3bb62dc9

php-ncurses-4.3.9-3.15.ia64.rpm
f5fb5c9e489b3205a77eb43e9d794f59
php-odbc-4.3.9-3.15.ia64.rpm
888b095ced3b5058a5a2ef3f28fdc0bf

php-pear-4.3.9-3.15.ia64.rpm
81de692b7a65b49905acbbc15923a969
php-pgsql-4.3.9-3.15.ia64.rpm
248e58b4de5ce83a3a03c177ab7782a9

php-snmp-4.3.9-3.15.ia64.rpm
f9fb2eac36fccecea0d95e45680dce7a
php-xmlrpc-4.3.9-3.15.ia64.rpm

x86_64:
eef5025da3ae88d290fc4ea7912f188d php-4.3.9-3.15.x86_64.rpm
d70d29f4a8f4de2737446fe166740735

php-debuginfo-4.3.9-3.15.x86_64.rpm
cbec1631a86b07709cca28258b4d3103
php-devel-4.3.9-3.15.x86_64.rpm
d0bc99f8cf1a936bdd2ebb0f3ca2bf9f

php-domxml-4.3.9-3.15.x86_64.rpm
90a8ffe9300be426e39d61716199da8b
php-gd-4.3.9-3.15.x86_64.rpm
2ccfc1f616ae13c45217e1a7afe41028

php-imap-4.3.9-3.15.x86_64.rpm
3b4264695e7278eee9fb8411c4e90e96
php-ldap-4.3.9-3.15.x86_64.rpm
a729d490b1b75691c10fe26996817096

php-mbstring-4.3.9-3.15.x86_64.rpm
6e43b892dcfa284d83a3f1b00feabaf9
php-mysql-4.3.9-3.15.x86_64.rpm
b949131046558d1a6b82c0fab860f0d9

php-ncurses-4.3.9-3.15.x86_64.rpm
9235dce05195d560a3c478796f6783ab
php-odbc-4.3.9-3.15.x86_64.rpm
bf18f80b06d7cbae0d962ab07f248ba6

php-pear-4.3.9-3.15.x86_64.rpm
9fd490cc180ef31c190e8385d0e0ce89
php-pgsql-4.3.9-3.15.x86_64.rpm
2f9c58c5a667f7f6fae643a2ef4a5380

php-snmp-4.3.9-3.15.x86_64.rpm
ea37846f2ae7d14c3fb163f6be22802d
php-xmlrpc-4.3.9-3.15.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://www.php.net/register_globals

http://www.redhat.com/security/updates/classification/#moderate

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3017

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.


Red Hat Security Advisory

Synopsis: Moderate: mutt security update
Advisory ID: RHSA-2006:0577-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0577.html

Issue date: 2006-07-12
Updated on: 2006-07-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-3242


1. Summary:

Updated mutt packages that fix a security issue are now
available.

This update has been rated as having moderate security impact by
the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386, ia64
Red Hat Linux Advanced Workstation 2.1 – ia64
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

Mutt is a text-mode mail user agent.

A buffer overflow flaw was found in the way Mutt processes an
overly long namespace from a malicious imap server. In order to
exploit this flaw a user would have to use Mutt to connect to a
malicious IMAP server. (CVE-2006-3242)

Users of Mutt are advised to upgrade to these erratum packages,
which contain a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

197151 – CVE-2006-3242 Mutt IMAP namespace buffer overflow

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/mutt-1.2.5.1-2.rhel21.src.rpm

54b1c502dcc5da91b83593a29e689cda
mutt-1.2.5.1-2.rhel21.src.rpm

i386:
7c33167f6a99327ea66a7d21158a3759
mutt-1.2.5.1-2.rhel21.i386.rpm

ia64:
4f6bb6963b32b2cd7394fa6311251732
mutt-1.2.5.1-2.rhel21.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/mutt-1.2.5.1-2.rhel21.src.rpm

54b1c502dcc5da91b83593a29e689cda
mutt-1.2.5.1-2.rhel21.src.rpm

ia64:
4f6bb6963b32b2cd7394fa6311251732
mutt-1.2.5.1-2.rhel21.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/mutt-1.2.5.1-2.rhel21.src.rpm

54b1c502dcc5da91b83593a29e689cda
mutt-1.2.5.1-2.rhel21.src.rpm

i386:
7c33167f6a99327ea66a7d21158a3759
mutt-1.2.5.1-2.rhel21.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:

ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/mutt-1.2.5.1-2.rhel21.src.rpm

54b1c502dcc5da91b83593a29e689cda
mutt-1.2.5.1-2.rhel21.src.rpm

i386:
7c33167f6a99327ea66a7d21158a3759
mutt-1.2.5.1-2.rhel21.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:

ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/mutt-1.4.1-3.5.rhel3.src.rpm

888328d8ea84f9d405cf68c1d37a4a62
mutt-1.4.1-3.5.rhel3.src.rpm

i386:
74ca0464aeb67b5f8915f796e729cc7a mutt

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis