Mandriva Linux
Mandriva Linux Security Advisory MDKSA-2006:201
http://www.mandriva.com/security/
Package : pam_ldap
Date : November 7, 2006
Affected: 2006.0, 2007.0, Corporate 4.0
Problem Description:
Pam_ldap does not return an error condition when an LDAP
directory server responds with a PasswordPolicyResponse control
response, which causes the pam_authenticate function to return a
success code even if authentication has failed, as originally
reported for xscreensaver. This might lead to an attacker being
able to login into a suspended system account.
Updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170
Updated Packages:
Mandriva Linux 2006.0:
88544f487e0884831e8dca48d9420eca
2006.0/i586/pam_ldap-180-2.1.20060mdk.i586.rpm
2873ac0db22512131ad2f4a5d055e035
2006.0/SRPMS/pam_ldap-180-2.1.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
4cdb139a35c0b877fccb62b344292133
2006.0/x86_64/pam_ldap-180-2.1.20060mdk.x86_64.rpm
2873ac0db22512131ad2f4a5d055e035
2006.0/SRPMS/pam_ldap-180-2.1.20060mdk.src.rpm
Mandriva Linux 2007.0:
338ecc4e0b69209b99f9ad317d6d2385
2007.0/i586/pam_ldap-180-4.1mdv2007.0.i586.rpm
3a747dcc317e95fdc9011c1dfc4254ef
2007.0/SRPMS/pam_ldap-180-4.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
079964ab75deaa3a8d723bc63c4e9be7
2007.0/x86_64/pam_ldap-180-4.1mdv2007.0.x86_64.rpm
3a747dcc317e95fdc9011c1dfc4254ef
2007.0/SRPMS/pam_ldap-180-4.1mdv2007.0.src.rpm
Corporate 4.0:
8e800885b38df7d3b566cea4934cdb24
corporate/4.0/i586/pam_ldap-180-3.1.20060mlcs4.i586.rpm
4abf9cd7b032153e407cf487968bc10a
corporate/4.0/SRPMS/pam_ldap-180-3.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
92a60cc8a2d16e7cb305a7665e39e696
corporate/4.0/x86_64/pam_ldap-180-3.1.20060mlcs4.x86_64.rpm
4abf9cd7b032153e407cf487968bc10a
corporate/4.0/SRPMS/pam_ldap-180-3.1.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Mandriva Linux Security Advisory MDKSA-2006:202
http://www.mandriva.com/security/
Package : wv
Date : November 7, 2006
Affected: 2006.0, 2007.0, Corporate 3.0
Problem Description:
Multiple integer overflows in the WV library in wvWare (formerly
mswordview) before 1.2.3, as used by AbiWord?, KWord, and possibly
other products, allow user-assisted remote attackers to execute
arbitrary code via a crafted Microsoft Word (DOC) file that
produces (1) large LFO clfolvl values in the wvGetLFO_records
function or (2) a large LFO nolfo value in the wvGetFLO_PLF
function.
Updated packages have been patched to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4513
Updated Packages:
Mandriva Linux 2006.0:
c176882af438f2855ad1ac719ea9fc04
2006.0/i586/libwv-1.0_3-1.0.3-3.1.20060mdk.i586.rpm
751dc9e1689833876cb1c2a0feaa507e
2006.0/i586/libwv-1.0_3-devel-1.0.3-3.1.20060mdk.i586.rpm
3e05943cd2ce03ddd3632ea790ad08fa
2006.0/i586/wv-1.0.3-3.1.20060mdk.i586.rpm
3da51e07d25e318ce98d027361ca0d38
2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
d66a09a81fdc11a12fe48c1115e247ec
2006.0/x86_64/lib64wv-1.0_3-1.0.3-3.1.20060mdk.x86_64.rpm
50a02068dcdcbf5238b619d7f22b2490
2006.0/x86_64/lib64wv-1.0_3-devel-1.0.3-3.1.20060mdk.x86_64.rpm
fba9cbca5c8207417353fd777a1578bf
2006.0/x86_64/wv-1.0.3-3.1.20060mdk.x86_64.rpm
3da51e07d25e318ce98d027361ca0d38
2006.0/SRPMS/wv-1.0.3-3.1.20060mdk.src.rpm
Mandriva Linux 2007.0:
f99e2be25e5532910e963a46ff34a0f7
2007.0/i586/libwv-1.2_0-1.2.0-6.1mdv2007.0.i586.rpm
f5ce02431ca181a1d8b4c66fa83fdea2
2007.0/i586/libwv-1.2_0-devel-1.2.0-6.1mdv2007.0.i586.rpm
eae36b8ab1ffca3528154c9aaf2a1cc0
2007.0/i586/wv-1.2.0-6.1mdv2007.0.i586.rpm
605b61cd28794f0e2a1657286e2e9b9f
2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
ffaa9c1620c2219f6729f42098a2f2c7
2007.0/x86_64/lib64wv-1.2_0-1.2.0-6.1mdv2007.0.x86_64.rpm
218209af9a92f6ff5d061e6cd1004522
2007.0/x86_64/lib64wv-1.2_0-devel-1.2.0-6.1mdv2007.0.x86_64.rpm
af48a39af76ec32a9c0bda829d3c094e
2007.0/x86_64/wv-1.2.0-6.1mdv2007.0.x86_64.rpm
605b61cd28794f0e2a1657286e2e9b9f
2007.0/SRPMS/wv-1.2.0-6.1mdv2007.0.src.rpm
Corporate 3.0:
a14668306062c5d70ab19a08cb9c292c
corporate/3.0/i586/libwv-1.0_0-1.0.0-1.3.C30mdk.i586.rpm
d6ad018517e90969f6dd872610524a7b
corporate/3.0/i586/libwv-1.0_0-devel-1.0.0-1.3.C30mdk.i586.rpm
c7d9681d497f4f2c48a9f97a997fc142
corporate/3.0/i586/wv-1.0.0-1.3.C30mdk.i586.rpm
bcb4a6f8a6795ab806525a788f9aecdb
corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm
Corporate 3.0/X86_64:
e57570724d3d286c0f218f0be359de19
corporate/3.0/x86_64/lib64wv-1.0_0-1.0.0-1.3.C30mdk.x86_64.rpm
f4a7a48698062e11872b962cfce782fe
corporate/3.0/x86_64/lib64wv-1.0_0-devel-1.0.0-1.3.C30mdk.x86_64.rpm
952c83dee6c42a8d03daa063b8dd4b5d
corporate/3.0/x86_64/wv-1.0.0-1.3.C30mdk.x86_64.rpm
bcb4a6f8a6795ab806525a788f9aecdb
corporate/3.0/SRPMS/wv-1.0.0-1.3.C30mdk.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Mandriva Linux Security Advisory MDKSA-2006:203
http://www.mandriva.com/security/
Package : texinfo
Date : November 8, 2006
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
Problem Description:
Miloslav Trmac discovered a buffer overflow in texinfo. This
issue can cause texi2dvi or texindex to crash when processing a
carefully crafted file.
Updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810
Updated Packages:
Mandriva Linux 2006.0:
cc1879d0392af708f7c37bca15dd9879
2006.0/i586/info-4.8-1.2.20060mdk.i586.rpm
4c80a4e06e04e28ae6bc9d34d0ce6b9c
2006.0/i586/info-install-4.8-1.2.20060mdk.i586.rpm
84e851c4c094d8259debe9a92da97efd
2006.0/i586/texinfo-4.8-1.2.20060mdk.i586.rpm
f63eeab2e5fd19d6df4d794cc9a0556d
2006.0/SRPMS/texinfo-4.8-1.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
b37fd6f8393fe1a997da4dfcf24e0c6c
2006.0/x86_64/info-4.8-1.2.20060mdk.x86_64.rpm
d3e5f5d3df7464226e370d18d2040d78
2006.0/x86_64/info-install-4.8-1.2.20060mdk.x86_64.rpm
94ad72f47a76488f8fe3000187217e9d
2006.0/x86_64/texinfo-4.8-1.2.20060mdk.x86_64.rpm
f63eeab2e5fd19d6df4d794cc9a0556d
2006.0/SRPMS/texinfo-4.8-1.2.20060mdk.src.rpm
Mandriva Linux 2007.0:
841f25fd2ae052fa135f347d1a321a61
2007.0/i586/info-4.8-4.1mdv2007.0.i586.rpm
d0ba0f48503167816581c5f4166949ad
2007.0/i586/info-install-4.8-4.1mdv2007.0.i586.rpm
c731ee9865530fdbafc445b56b67e5ad
2007.0/i586/texinfo-4.8-4.1mdv2007.0.i586.rpm
b8bf1a5838ac82d4910e9a5e5ea612b4
2007.0/SRPMS/texinfo-4.8-4.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
054058a5ef065bc25d0bb87b36ad3622
2007.0/x86_64/info-4.8-4.1mdv2007.0.x86_64.rpm
5b63631e0cd60e201e14332faf3e30d8
2007.0/x86_64/info-install-4.8-4.1mdv2007.0.x86_64.rpm
cbdda90e9cce0abc9de7fdfab70f593e
2007.0/x86_64/texinfo-4.8-4.1mdv2007.0.x86_64.rpm
b8bf1a5838ac82d4910e9a5e5ea612b4
2007.0/SRPMS/texinfo-4.8-4.1mdv2007.0.src.rpm
Corporate 3.0:
81b5711c0afe51a12aa4458ab0b680c3
corporate/3.0/i586/info-4.6-1.2.C30mdk.i586.rpm
65e67c1be9ca13d7320218e60fab855c
corporate/3.0/i586/info-install-4.6-1.2.C30mdk.i586.rpm
fc7f021455259a97412c95b3939ede98
corporate/3.0/i586/texinfo-4.6-1.2.C30mdk.i586.rpm
13d484c70a47aa50038c1f59b514aaaa
corporate/3.0/SRPMS/texinfo-4.6-1.2.C30mdk.src.rpm
Corporate 3.0/X86_64:
942bc82c461a5bd53799978b7c7d37ac
corporate/3.0/x86_64/info-4.6-1.2.C30mdk.x86_64.rpm
616999400ddebcfc8593bfb47f7a8835
corporate/3.0/x86_64/info-install-4.6-1.2.C30mdk.x86_64.rpm
ad900d22f4e1402ef303aa211109845a
corporate/3.0/x86_64/texinfo-4.6-1.2.C30mdk.x86_64.rpm
13d484c70a47aa50038c1f59b514aaaa
corporate/3.0/SRPMS/texinfo-4.6-1.2.C30mdk.src.rpm
Corporate 4.0:
cc0ef9a317302dc40c14d90bbc10200d
corporate/4.0/i586/info-4.8-1.2.20060mlcs4.i586.rpm
db1c66093560e85561313346c9e8d110
corporate/4.0/i586/info-install-4.8-1.2.20060mlcs4.i586.rpm
cacd6c6cc8e1f1199d3bfc9efafe53f7
corporate/4.0/i586/texinfo-4.8-1.2.20060mlcs4.i586.rpm
915e8d5f747b0ed558491ed474f3ca4f
corporate/4.0/SRPMS/texinfo-4.8-1.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
0016ff4dfe7b413ef3dff74d6d5037e2
corporate/4.0/x86_64/info-4.8-1.2.20060mlcs4.x86_64.rpm
4d4b71acc580a419fbb2a8654324a8b7
corporate/4.0/x86_64/info-install-4.8-1.2.20060mlcs4.x86_64.rpm
09f9fcfe879baa6a4296bde478e536c5
corporate/4.0/x86_64/texinfo-4.8-1.2.20060mlcs4.x86_64.rpm
915e8d5f747b0ed558491ed474f3ca4f
corporate/4.0/SRPMS/texinfo-4.8-1.2.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The
verification of md5 checksums and GPG signatures is performed
automatically for you.
All packages are signed by Mandriva for security. You can obtain
the GPG public key of the Mandriva Security Team by executing:
gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
Red Hat Linux
Red Hat Security Advisory
Synopsis: Moderate: texinfo security update
Advisory ID: RHSA-2006:0727-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0727.html
Issue date: 2006-11-08
Updated on: 2006-11-08
Product: Red Hat Enterprise Linux
CVE Names: CVE-2005-3011 CVE-2006-4810
1. Summary:
New Texinfo packages that fix various security vulnerabilities
are now available.
This update has been rated as having moderate security impact by
the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386, ia64
Red Hat Linux Advanced Workstation 2.1 – ia64
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
Texinfo is a documentation system that can produce both online
information and printed output from a single source file.
A buffer overflow flaw was found in Texinfo’s texindex command.
An attacker could construct a carefully crafted Texinfo file that
could cause texindex to crash or possibly execute arbitrary code
when opened. (CVE-2006-4810)
A flaw was found in the way Texinfo’s texindex command creates
temporary files. A local user could leverage this flaw to overwrite
files the user executing texindex has write access to.
(CVE-2005-3011)
Users of Texinfo should upgrade to these updated packages which
contain backported patches and are not vulnerable to these
issues.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
169583 – CVE-2005-3011 texindex insecure temporary file
usage
170743 – CVE-2005-3011 texindex insecure temporary file usage
170744 – CVE-2005-3011 texindex insecure temporary file usage
211484 – CVE-2006-4810 texindex buffer overflow
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm
4f77dc80717cf15b1f565cb8dfb12b8c
texinfo-4.0b-3.el2.1.src.rpm
i386:
878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm
58cc2bc691496d3aef522fc87449554b
texinfo-4.0b-3.el2.1.i386.rpm
ia64:
a259d8d26dbaa8cc96686f169dc05911 info-4.0b-3.el2.1.ia64.rpm
6fae56c8168b45be80ae719ebe0aca82
texinfo-4.0b-3.el2.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm
4f77dc80717cf15b1f565cb8dfb12b8c
texinfo-4.0b-3.el2.1.src.rpm
ia64:
a259d8d26dbaa8cc96686f169dc05911 info-4.0b-3.el2.1.ia64.rpm
6fae56c8168b45be80ae719ebe0aca82
texinfo-4.0b-3.el2.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm
4f77dc80717cf15b1f565cb8dfb12b8c
texinfo-4.0b-3.el2.1.src.rpm
i386:
878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm
58cc2bc691496d3aef522fc87449554b
texinfo-4.0b-3.el2.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/texinfo-4.0b-3.el2.1.src.rpm
4f77dc80717cf15b1f565cb8dfb12b8c
texinfo-4.0b-3.el2.1.src.rpm
i386:
878a207e614180cf8fd43920d51947d6 info-4.0b-3.el2.1.i386.rpm
58cc2bc691496d3aef522fc87449554b
texinfo-4.0b-3.el2.1.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm
cae389223d777d79c862b4672c75a9e1
texinfo-4.5-3.el3.1.src.rpm
i386:
1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm
04bd5020018f6727b77fd8c2a9fb2588
texinfo-4.5-3.el3.1.i386.rpm
1ee197caad9a5c8fa930215a7c5ca9e6
texinfo-debuginfo-4.5-3.el3.1.i386.rpm
ia64:
42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm
3fabad46614f61118bc29cffbd83df54
texinfo-4.5-3.el3.1.ia64.rpm
d8bb2bd2fd7be72a8822e93b1372b625
texinfo-debuginfo-4.5-3.el3.1.ia64.rpm
ppc:
5fe3e1eca608678fc0770f0de702cd8d info-4.5-3.el3.1.ppc.rpm
9275ad56b995b25f275af0a44c3d01bf
texinfo-4.5-3.el3.1.ppc.rpm
f54a3f00a87b3ce1d4d0af73f0601bf7
texinfo-debuginfo-4.5-3.el3.1.ppc.rpm
s390:
215d4ea1202a2309c7c676e3c1e46299 info-4.5-3.el3.1.s390.rpm
7085ead3927535c315c336c3314b9d2f
texinfo-4.5-3.el3.1.s390.rpm
2d670e1ec1d3ab67628aa982d125bed4
texinfo-debuginfo-4.5-3.el3.1.s390.rpm
s390x:
fd6332f0b59ad9bd8f99cf40a8ff1ad9 info-4.5-3.el3.1.s390x.rpm
a7d61c3643d31ac0db2f6b15d0ea996b
texinfo-4.5-3.el3.1.s390x.rpm
566c653544cdb5e1a5eb82f6b67edb9c
texinfo-debuginfo-4.5-3.el3.1.s390x.rpm
x86_64:
544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm
8921c67695089cf7d6fb4bc7fe61c24a
texinfo-4.5-3.el3.1.x86_64.rpm
5e7e98da194c722cee0ab2e1f05989b8
texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm
cae389223d777d79c862b4672c75a9e1
texinfo-4.5-3.el3.1.src.rpm
i386:
1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm
04bd5020018f6727b77fd8c2a9fb2588
texinfo-4.5-3.el3.1.i386.rpm
1ee197caad9a5c8fa930215a7c5ca9e6
texinfo-debuginfo-4.5-3.el3.1.i386.rpm
x86_64:
544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm
8921c67695089cf7d6fb4bc7fe61c24a
texinfo-4.5-3.el3.1.x86_64.rpm
5e7e98da194c722cee0ab2e1f05989b8
texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm
cae389223d777d79c862b4672c75a9e1
texinfo-4.5-3.el3.1.src.rpm
i386:
1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm
04bd5020018f6727b77fd8c2a9fb2588
texinfo-4.5-3.el3.1.i386.rpm
1ee197caad9a5c8fa930215a7c5ca9e6
texinfo-debuginfo-4.5-3.el3.1.i386.rpm
ia64:
42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm
3fabad46614f61118bc29cffbd83df54
texinfo-4.5-3.el3.1.ia64.rpm
d8bb2bd2fd7be72a8822e93b1372b625
texinfo-debuginfo-4.5-3.el3.1.ia64.rpm
x86_64:
544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm
8921c67695089cf7d6fb4bc7fe61c24a
texinfo-4.5-3.el3.1.x86_64.rpm
5e7e98da194c722cee0ab2e1f05989b8
texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/texinfo-4.5-3.el3.1.src.rpm
cae389223d777d79c862b4672c75a9e1
texinfo-4.5-3.el3.1.src.rpm
i386:
1fc65ec7fb762b72f4f31030e10a8bba info-4.5-3.el3.1.i386.rpm
04bd5020018f6727b77fd8c2a9fb2588
texinfo-4.5-3.el3.1.i386.rpm
1ee197caad9a5c8fa930215a7c5ca9e6
texinfo-debuginfo-4.5-3.el3.1.i386.rpm
ia64:
42ca02702693284272a52b61b0914d66 info-4.5-3.el3.1.ia64.rpm
3fabad46614f61118bc29cffbd83df54
texinfo-4.5-3.el3.1.ia64.rpm
d8bb2bd2fd7be72a8822e93b1372b625
texinfo-debuginfo-4.5-3.el3.1.ia64.rpm
x86_64:
544245c16b5f0d94a65c9c9ccb4c94cc info-4.5-3.el3.1.x86_64.rpm
8921c67695089cf7d6fb4bc7fe61c24a
texinfo-4.5-3.el3.1.x86_64.rpm
5e7e98da194c722cee0ab2e1f05989b8
texinfo-debuginfo-4.5-3.el3.1.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm
c5fabea21ca9dbc20658e542dabf2922
texinfo-4.7-5.el4.2.src.rpm
i386:
7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm
5f509002c109ce1a2b9876b60e7b1eee
texinfo-4.7-5.el4.2.i386.rpm
11151582bace0b111ec2061041da9a01
texinfo-debuginfo-4.7-5.el4.2.i386.rpm
ia64:
99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm
119c541a6cfe685fc2762e4718c772de
texinfo-4.7-5.el4.2.ia64.rpm
17d075dc8887246a394f9bb699791d81
texinfo-debuginfo-4.7-5.el4.2.ia64.rpm
ppc:
706a14c171a272ce82f3201364ec17a2 info-4.7-5.el4.2.ppc.rpm
1d1b035106a9889fa3bfa96f79a88248
texinfo-4.7-5.el4.2.ppc.rpm
52cc1d3e4c5fa6f2d745654706363d22
texinfo-debuginfo-4.7-5.el4.2.ppc.rpm
s390:
1f1c0056ceed97e903f70f9583bce14a info-4.7-5.el4.2.s390.rpm
d4170f862521f47487a88eae5f1c6946
texinfo-4.7-5.el4.2.s390.rpm
6eb45ee9e2bcf48289334e33c3b54846
texinfo-debuginfo-4.7-5.el4.2.s390.rpm
s390x:
f5ccba218def5a9c496ff4ff6a8177d2 info-4.7-5.el4.2.s390x.rpm
bd3f9d50bb9855b8adeefe44ca7c0793
texinfo-4.7-5.el4.2.s390x.rpm
d64aa22173ce1036c50a23748f835251
texinfo-debuginfo-4.7-5.el4.2.s390x.rpm
x86_64:
8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm
33ec657749738e6737a569d75ffe79c3
texinfo-4.7-5.el4.2.x86_64.rpm
d824601958b4d0b0961f5ea9c312bd9e
texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm
c5fabea21ca9dbc20658e542dabf2922
texinfo-4.7-5.el4.2.src.rpm
i386:
7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm
5f509002c109ce1a2b9876b60e7b1eee
texinfo-4.7-5.el4.2.i386.rpm
11151582bace0b111ec2061041da9a01
texinfo-debuginfo-4.7-5.el4.2.i386.rpm
x86_64:
8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm
33ec657749738e6737a569d75ffe79c3
texinfo-4.7-5.el4.2.x86_64.rpm
d824601958b4d0b0961f5ea9c312bd9e
texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm
c5fabea21ca9dbc20658e542dabf2922
texinfo-4.7-5.el4.2.src.rpm
i386:
7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm
5f509002c109ce1a2b9876b60e7b1eee
texinfo-4.7-5.el4.2.i386.rpm
11151582bace0b111ec2061041da9a01
texinfo-debuginfo-4.7-5.el4.2.i386.rpm
ia64:
99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm
119c541a6cfe685fc2762e4718c772de
texinfo-4.7-5.el4.2.ia64.rpm
17d075dc8887246a394f9bb699791d81
texinfo-debuginfo-4.7-5.el4.2.ia64.rpm
x86_64:
8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm
33ec657749738e6737a569d75ffe79c3
texinfo-4.7-5.el4.2.x86_64.rpm
d824601958b4d0b0961f5ea9c312bd9e
texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/texinfo-4.7-5.el4.2.src.rpm
c5fabea21ca9dbc20658e542dabf2922
texinfo-4.7-5.el4.2.src.rpm
i386:
7e86f2eef9fb548f6be88025bee5a9b6 info-4.7-5.el4.2.i386.rpm
5f509002c109ce1a2b9876b60e7b1eee
texinfo-4.7-5.el4.2.i386.rpm
11151582bace0b111ec2061041da9a01
texinfo-debuginfo-4.7-5.el4.2.i386.rpm
ia64:
99deee5e7579a4d49a0c7cb82a13e54b info-4.7-5.el4.2.ia64.rpm
119c541a6cfe685fc2762e4718c772de
texinfo-4.7-5.el4.2.ia64.rpm
17d075dc8887246a394f9bb699791d81
texinfo-debuginfo-4.7-5.el4.2.ia64.rpm
x86_64:
8211780e84883ff3c9f5428a54cadfcd info-4.7-5.el4.2.x86_64.rpm
33ec657749738e6737a569d75ffe79c3
texinfo-4.7-5.el4.2.x86_64.rpm
d824601958b4d0b0961f5ea9c312bd9e
texinfo-debuginfo-4.7-5.el4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810
http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc.
Red Hat Security Advisory
Synopsis: Moderate: ruby security update
Advisory ID: RHSA-2006:0729-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0729.html
Issue date: 2006-11-08
Updated on: 2006-11-08
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-5467
1. Summary:
Updated ruby packages that fix a denial of service issue for the
CGI instance are now available.
This update has been rated as having moderate security impact by
the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
Ruby is an interpreted scripting language for object-oriented
programming.
A flaw was discovered in the way Ruby’s CGI module handles
certain multipart/form-data MIME data. If a remote attacker sends a
specially crafted multipart-form-data request, it is possible to
cause the ruby CGI script to enter an infinite loop, causing a
denial of service. (CVE-2006-5467)
Users of Ruby should upgrade to these updated packages which
contain backported patches and are not vulnerable to these
issues.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via the Red Hat Network. To use the Red
Hat Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
212237 – CVE-2006-5467 Ruby CGI multipart parsing DoS
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm
da33f04add8f92b85398c097a6e1afe2
ruby-1.6.4-2.AS21.4.src.rpm
i386:
03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm
559f16472af5d47d492d076e5f576fb0
ruby-1.6.4-2.AS21.4.i386.rpm
d3a4d6865c09af74fcdd53113b558bb3
ruby-devel-1.6.4-2.AS21.4.i386.rpm
d908d490a0d3a57a96ecfb62c9eb53fa
ruby-docs-1.6.4-2.AS21.4.i386.rpm
6716140060e7050901f36db98f449121
ruby-libs-1.6.4-2.AS21.4.i386.rpm
1568989d2a32453150c6113e02342f23
ruby-tcltk-1.6.4-2.AS21.4.i386.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm
da33f04add8f92b85398c097a6e1afe2
ruby-1.6.4-2.AS21.4.src.rpm
i386:
03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm
559f16472af5d47d492d076e5f576fb0
ruby-1.6.4-2.AS21.4.i386.rpm
d3a4d6865c09af74fcdd53113b558bb3
ruby-devel-1.6.4-2.AS21.4.i386.rpm
d908d490a0d3a57a96ecfb62c9eb53fa
ruby-docs-1.6.4-2.AS21.4.i386.rpm
6716140060e7050901f36db98f449121
ruby-libs-1.6.4-2.AS21.4.i386.rpm
1568989d2a32453150c6113e02342f23
ruby-tcltk-1.6.4-2.AS21.4.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ruby-1.6.4-2.AS21.4.src.rpm
da33f04add8f92b85398c097a6e1afe2
ruby-1.6.4-2.AS21.4.src.rpm
i386:
03a6bf04844134d724c017e785409000 irb-1.6.4-2.AS21.4.i386.rpm
559f16472af5d47d492d076e5f576fb0
ruby-1.6.4-2.AS21.4.i386.rpm
d3a4d6865c09af74fcdd53113b558bb3
ruby-devel-1.6.4-2.AS21.4.i386.rpm
d908d490a0d3a57a96ecfb62c9eb53fa
ruby-docs-1.6.4-2.AS21.4.i386.rpm
6716140060e7050901f36db98f449121
ruby-libs-1.6.4-2.AS21.4.i386.rpm
1568989d2a32453150c6113e02342f23
ruby-tcltk-1.6.4-2.AS21.4.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm
eca0052ddce8bc444b0ed0f4daa97c08
ruby-1.6.8-9.EL3.8.src.rpm
i386:
b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm
685a1e2ccc3a94a89d6a8c0652eda247
ruby-1.6.8-9.EL3.8.i386.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
5f6fa5ef75eed97aeb47535f59c24cf1
ruby-devel-1.6.8-9.EL3.8.i386.rpm
1ea9a07cebaa322a31f3847d2e0a69cf
ruby-docs-1.6.8-9.EL3.8.i386.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
ce7b0585a1bb6ec95e6a7ba29e6e72c5
ruby-mode-1.6.8-9.EL3.8.i386.rpm
237aa7d1789783e229b050f9c5af52a4
ruby-tcltk-1.6.8-9.EL3.8.i386.rpm
ia64:
a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm
e242fcc5ba32b3d00be4810238376471
ruby-1.6.8-9.EL3.8.ia64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
f677dd674f161fcf49b38c17620dcbaf
ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm
d1f0c119cb0a22b2a103a1f5629c960a
ruby-devel-1.6.8-9.EL3.8.ia64.rpm
d2acb7e1bcb312a09952233169562b0c
ruby-docs-1.6.8-9.EL3.8.ia64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
1d024a540d285437f1b12e680768a8a8
ruby-libs-1.6.8-9.EL3.8.ia64.rpm
3a103e5aa1a670ce7bae8296e01b042d
ruby-mode-1.6.8-9.EL3.8.ia64.rpm
d924d18b0631f96d11f25cbeb6b4c8e2
ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm
ppc:
866683a3215130d535628afea3d067cb irb-1.6.8-9.EL3.8.ppc.rpm
5a93e383b8bf6e017e4981d32dff5977 ruby-1.6.8-9.EL3.8.ppc.rpm
ce11871f57601915fb997afe51203cb7
ruby-debuginfo-1.6.8-9.EL3.8.ppc.rpm
047918d10246a726f41ce119824b289e
ruby-debuginfo-1.6.8-9.EL3.8.ppc64.rpm
cbec5c81375db8ccf58830f6561e4856
ruby-devel-1.6.8-9.EL3.8.ppc.rpm
46a242fe3e9b6414b3be61930b16ad2e
ruby-docs-1.6.8-9.EL3.8.ppc.rpm
20242af919fdee83f3dedde6a23ae206
ruby-libs-1.6.8-9.EL3.8.ppc.rpm
f2742498fcbe91c42daaa973b7a8d643
ruby-libs-1.6.8-9.EL3.8.ppc64.rpm
a5838ed6e5b3a64fe2ed19c4b60bd7a9
ruby-mode-1.6.8-9.EL3.8.ppc.rpm
4df5200faa7579ec4544c9732db1712d
ruby-tcltk-1.6.8-9.EL3.8.ppc.rpm
s390:
805e7e94b9aea16518fdc9c0f7b54de4 irb-1.6.8-9.EL3.8.s390.rpm
9a8dfb118a771aab8a46805882f7d810
ruby-1.6.8-9.EL3.8.s390.rpm
7318bfe46cfe4a78bebd019e061afd56
ruby-debuginfo-1.6.8-9.EL3.8.s390.rpm
9512b4836f9f4885e990206237386534
ruby-devel-1.6.8-9.EL3.8.s390.rpm
9787466ca28e1cb911349dbed4d445a9
ruby-docs-1.6.8-9.EL3.8.s390.rpm
35a417a8272035f4235bc22be9b37ed0
ruby-libs-1.6.8-9.EL3.8.s390.rpm
eda38660bd8734461ee1e1e2b0292388
ruby-mode-1.6.8-9.EL3.8.s390.rpm
c23832c14cb5b26100cdd5d00decf092
ruby-tcltk-1.6.8-9.EL3.8.s390.rpm
s390x:
88d994de226b7da4b2da72f459def426 irb-1.6.8-9.EL3.8.s390x.rpm
b5c906ffcb09794210e113715c9aba09
ruby-1.6.8-9.EL3.8.s390x.rpm
7318bfe46cfe4a78bebd019e061afd56
ruby-debuginfo-1.6.8-9.EL3.8.s390.rpm
4df63e5e8add34ee3cafa2eac019f693
ruby-debuginfo-1.6.8-9.EL3.8.s390x.rpm
961d7de617203422fab50b80be20625f
ruby-devel-1.6.8-9.EL3.8.s390x.rpm
9fb08ed816f919fb40337f44d2fae961
ruby-docs-1.6.8-9.EL3.8.s390x.rpm
35a417a8272035f4235bc22be9b37ed0
ruby-libs-1.6.8-9.EL3.8.s390.rpm
570893bdc62b196b498de7034ec7bd63
ruby-libs-1.6.8-9.EL3.8.s390x.rpm
b2db7d1ba75dca965e62ff03f4d16639
ruby-mode-1.6.8-9.EL3.8.s390x.rpm
d851b374670d53243eab5d1f6265003b
ruby-tcltk-1.6.8-9.EL3.8.s390x.rpm
x86_64:
a41fea091e450a7558a2d7200aaf566c
irb-1.6.8-9.EL3.8.x86_64.rpm
35df04fe195136a178bbf8a31a0a7200
ruby-1.6.8-9.EL3.8.x86_64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
10b72cabfa52537ce0157fbaefafb8f5
ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm
257cec5ad60d8e95f2ab6ba058d66081
ruby-devel-1.6.8-9.EL3.8.x86_64.rpm
3e5c1c18340363f530635716378b4945
ruby-docs-1.6.8-9.EL3.8.x86_64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
3285ba0ba282e3edf7be9c67712ea5e0
ruby-libs-1.6.8-9.EL3.8.x86_64.rpm
02539122beea941018a82360942b3111
ruby-mode-1.6.8-9.EL3.8.x86_64.rpm
a8043f4ba3d9ce7404e0b4bbd85073ce
ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm
eca0052ddce8bc444b0ed0f4daa97c08
ruby-1.6.8-9.EL3.8.src.rpm
i386:
b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm
685a1e2ccc3a94a89d6a8c0652eda247
ruby-1.6.8-9.EL3.8.i386.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
5f6fa5ef75eed97aeb47535f59c24cf1
ruby-devel-1.6.8-9.EL3.8.i386.rpm
1ea9a07cebaa322a31f3847d2e0a69cf
ruby-docs-1.6.8-9.EL3.8.i386.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
ce7b0585a1bb6ec95e6a7ba29e6e72c5
ruby-mode-1.6.8-9.EL3.8.i386.rpm
237aa7d1789783e229b050f9c5af52a4
ruby-tcltk-1.6.8-9.EL3.8.i386.rpm
x86_64:
a41fea091e450a7558a2d7200aaf566c
irb-1.6.8-9.EL3.8.x86_64.rpm
35df04fe195136a178bbf8a31a0a7200
ruby-1.6.8-9.EL3.8.x86_64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
10b72cabfa52537ce0157fbaefafb8f5
ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm
257cec5ad60d8e95f2ab6ba058d66081
ruby-devel-1.6.8-9.EL3.8.x86_64.rpm
3e5c1c18340363f530635716378b4945
ruby-docs-1.6.8-9.EL3.8.x86_64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
3285ba0ba282e3edf7be9c67712ea5e0
ruby-libs-1.6.8-9.EL3.8.x86_64.rpm
02539122beea941018a82360942b3111
ruby-mode-1.6.8-9.EL3.8.x86_64.rpm
a8043f4ba3d9ce7404e0b4bbd85073ce
ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm
eca0052ddce8bc444b0ed0f4daa97c08
ruby-1.6.8-9.EL3.8.src.rpm
i386:
b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm
685a1e2ccc3a94a89d6a8c0652eda247
ruby-1.6.8-9.EL3.8.i386.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
5f6fa5ef75eed97aeb47535f59c24cf1
ruby-devel-1.6.8-9.EL3.8.i386.rpm
1ea9a07cebaa322a31f3847d2e0a69cf
ruby-docs-1.6.8-9.EL3.8.i386.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
ce7b0585a1bb6ec95e6a7ba29e6e72c5
ruby-mode-1.6.8-9.EL3.8.i386.rpm
237aa7d1789783e229b050f9c5af52a4
ruby-tcltk-1.6.8-9.EL3.8.i386.rpm
ia64:
a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm
e242fcc5ba32b3d00be4810238376471
ruby-1.6.8-9.EL3.8.ia64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
f677dd674f161fcf49b38c17620dcbaf
ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm
d1f0c119cb0a22b2a103a1f5629c960a
ruby-devel-1.6.8-9.EL3.8.ia64.rpm
d2acb7e1bcb312a09952233169562b0c
ruby-docs-1.6.8-9.EL3.8.ia64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
1d024a540d285437f1b12e680768a8a8
ruby-libs-1.6.8-9.EL3.8.ia64.rpm
3a103e5aa1a670ce7bae8296e01b042d
ruby-mode-1.6.8-9.EL3.8.ia64.rpm
d924d18b0631f96d11f25cbeb6b4c8e2
ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm
x86_64:
a41fea091e450a7558a2d7200aaf566c
irb-1.6.8-9.EL3.8.x86_64.rpm
35df04fe195136a178bbf8a31a0a7200
ruby-1.6.8-9.EL3.8.x86_64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
10b72cabfa52537ce0157fbaefafb8f5
ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm
257cec5ad60d8e95f2ab6ba058d66081
ruby-devel-1.6.8-9.EL3.8.x86_64.rpm
3e5c1c18340363f530635716378b4945
ruby-docs-1.6.8-9.EL3.8.x86_64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
3285ba0ba282e3edf7be9c67712ea5e0
ruby-libs-1.6.8-9.EL3.8.x86_64.rpm
02539122beea941018a82360942b3111
ruby-mode-1.6.8-9.EL3.8.x86_64.rpm
a8043f4ba3d9ce7404e0b4bbd85073ce
ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ruby-1.6.8-9.EL3.8.src.rpm
eca0052ddce8bc444b0ed0f4daa97c08
ruby-1.6.8-9.EL3.8.src.rpm
i386:
b1df24956fff58fa9edac89039fd7dea irb-1.6.8-9.EL3.8.i386.rpm
685a1e2ccc3a94a89d6a8c0652eda247
ruby-1.6.8-9.EL3.8.i386.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
5f6fa5ef75eed97aeb47535f59c24cf1
ruby-devel-1.6.8-9.EL3.8.i386.rpm
1ea9a07cebaa322a31f3847d2e0a69cf
ruby-docs-1.6.8-9.EL3.8.i386.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
ce7b0585a1bb6ec95e6a7ba29e6e72c5
ruby-mode-1.6.8-9.EL3.8.i386.rpm
237aa7d1789783e229b050f9c5af52a4
ruby-tcltk-1.6.8-9.EL3.8.i386.rpm
ia64:
a4f8517cdb35273d7bf190b49fc9db63 irb-1.6.8-9.EL3.8.ia64.rpm
e242fcc5ba32b3d00be4810238376471
ruby-1.6.8-9.EL3.8.ia64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
f677dd674f161fcf49b38c17620dcbaf
ruby-debuginfo-1.6.8-9.EL3.8.ia64.rpm
d1f0c119cb0a22b2a103a1f5629c960a
ruby-devel-1.6.8-9.EL3.8.ia64.rpm
d2acb7e1bcb312a09952233169562b0c
ruby-docs-1.6.8-9.EL3.8.ia64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
1d024a540d285437f1b12e680768a8a8
ruby-libs-1.6.8-9.EL3.8.ia64.rpm
3a103e5aa1a670ce7bae8296e01b042d
ruby-mode-1.6.8-9.EL3.8.ia64.rpm
d924d18b0631f96d11f25cbeb6b4c8e2
ruby-tcltk-1.6.8-9.EL3.8.ia64.rpm
x86_64:
a41fea091e450a7558a2d7200aaf566c
irb-1.6.8-9.EL3.8.x86_64.rpm
35df04fe195136a178bbf8a31a0a7200
ruby-1.6.8-9.EL3.8.x86_64.rpm
cfde0106dbbefdda79e27e1a2aebeafe
ruby-debuginfo-1.6.8-9.EL3.8.i386.rpm
10b72cabfa52537ce0157fbaefafb8f5
ruby-debuginfo-1.6.8-9.EL3.8.x86_64.rpm
257cec5ad60d8e95f2ab6ba058d66081
ruby-devel-1.6.8-9.EL3.8.x86_64.rpm
3e5c1c18340363f530635716378b4945
ruby-docs-1.6.8-9.EL3.8.x86_64.rpm
141d13ceb9073452a45f5a0122aff48c
ruby-libs-1.6.8-9.EL3.8.i386.rpm
3285ba0ba282e3edf7be9c67712ea5e0
ruby-libs-1.6.8-9.EL3.8.x86_64.rpm
02539122beea941018a82360942b3111
ruby-mode-1.6.8-9.EL3.8.x86_64.rpm
a8043f4ba3d9ce7404e0b4bbd85073ce
ruby-tcltk-1.6.8-9.EL3.8.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm
79a0839bc49b4954d3a6e8ba6448fce5
ruby-1.8.1-7.EL4.8.src.rpm
i386:
17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm
84135ec3cf941c0786b0b94ff8b8ce49
ruby-1.8.1-7.EL4.8.i386.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
8a6b1a06c6937ce066b72a1ac9cd4067
ruby-devel-1.8.1-7.EL4.8.i386.rpm
7bb1cdebaf73798c5324b84da3b4ff3c
ruby-docs-1.8.1-7.EL4.8.i386.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
05f985e7860daece4a8709dccda6214b
ruby-mode-1.8.1-7.EL4.8.i386.rpm
38e62459fb4f9c96a14f67a612385c9a
ruby-tcltk-1.8.1-7.EL4.8.i386.rpm
ia64:
3ba797719ac856a9a32af725fa524343 irb-1.8.1-7.EL4.8.ia64.rpm
e4c7a149c0ca0c16aa129d9908d27707
ruby-1.8.1-7.EL4.8.ia64.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
7d46029096751904c8257f61df081206
ruby-debuginfo-1.8.1-7.EL4.8.ia64.rpm
03107196a8326d0dbf3b77aed76bf0a9
ruby-devel-1.8.1-7.EL4.8.ia64.rpm
64cb05eb1c5b8455f495db254cfea059
ruby-docs-1.8.1-7.EL4.8.ia64.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
54a92920cc2753b3e09c11bd9bd418e6
ruby-libs-1.8.1-7.EL4.8.ia64.rpm
76ca52df8a3f6204b6e7462d82c3ca5d
ruby-mode-1.8.1-7.EL4.8.ia64.rpm
cfee61a676297f9c948482ea6cfdf327
ruby-tcltk-1.8.1-7.EL4.8.ia64.rpm
ppc:
b62ebb81d907646f2f1abf9e38321c8b irb-1.8.1-7.EL4.8.ppc.rpm
9193d4d2dda77cf671d63c78d712e278 ruby-1.8.1-7.EL4.8.ppc.rpm
d38bee62a89060c45f244ce837c4ada3
ruby-debuginfo-1.8.1-7.EL4.8.ppc.rpm
46d26d36bf6dda1d2161668b63763f3d
ruby-debuginfo-1.8.1-7.EL4.8.ppc64.rpm
96325b82a466fdfac1d4c500bfbcd7db
ruby-devel-1.8.1-7.EL4.8.ppc.rpm
664fffe2d54ed85d28be82e0bb04cdc2
ruby-docs-1.8.1-7.EL4.8.ppc.rpm
08ad284e3e39251741412f2122e119ce
ruby-libs-1.8.1-7.EL4.8.ppc.rpm
f635833ff98ffbde26103e4cc72d8946
ruby-libs-1.8.1-7.EL4.8.ppc64.rpm
4086943969810d7724212c6b93c36aac
ruby-mode-1.8.1-7.EL4.8.ppc.rpm
26418ed60f6805864ad34ae7a8e22d7a
ruby-tcltk-1.8.1-7.EL4.8.ppc.rpm
s390:
08f666e14511690c213a75cd6f802cb2 irb-1.8.1-7.EL4.8.s390.rpm
4d9bbaae8c4abf8d7e51f8e392548377
ruby-1.8.1-7.EL4.8.s390.rpm
9cefbd86d92dcaf5953a04cbd7415e1f
ruby-debuginfo-1.8.1-7.EL4.8.s390.rpm
b879874e3ab4f5ec0f3c113c44d4d701
ruby-devel-1.8.1-7.EL4.8.s390.rpm
b8fe87c0e033369c782e8c20a3cb9a9f
ruby-docs-1.8.1-7.EL4.8.s390.rpm
2337c99a80be0684eb65fcd6a0bb3d7f
ruby-libs-1.8.1-7.EL4.8.s390.rpm
9ce34874770248c2e3430e0be1769af7
ruby-mode-1.8.1-7.EL4.8.s390.rpm
c1437202b8bbba1ae063fa1c491ed7de
ruby-tcltk-1.8.1-7.EL4.8.s390.rpm
s390x:
93658817dde1423ea84b840a230d4677 irb-1.8.1-7.EL4.8.s390x.rpm
436b1730c80eafe80cfd2868f642d85e
ruby-1.8.1-7.EL4.8.s390x.rpm
9cefbd86d92dcaf5953a04cbd7415e1f
ruby-debuginfo-1.8.1-7.EL4.8.s390.rpm
372406df8dcf8ef45b180dca9f53947b
ruby-debuginfo-1.8.1-7.EL4.8.s390x.rpm
6bd812620e92594ad55517ab1d36a9b7
ruby-devel-1.8.1-7.EL4.8.s390x.rpm
9633a2f5ab25b12af9c12cc850f53fc5
ruby-docs-1.8.1-7.EL4.8.s390x.rpm
2337c99a80be0684eb65fcd6a0bb3d7f
ruby-libs-1.8.1-7.EL4.8.s390.rpm
892997fa3dbcaed8167d89aa700874d0
ruby-libs-1.8.1-7.EL4.8.s390x.rpm
18c633b9d39c7e1e0bf70c9ef3c7916c
ruby-mode-1.8.1-7.EL4.8.s390x.rpm
703b2419b89fb75efd0e36ef2bea0649
ruby-tcltk-1.8.1-7.EL4.8.s390x.rpm
x86_64:
f90ab40469e260ce1e362ce345dd0783
irb-1.8.1-7.EL4.8.x86_64.rpm
0eef3d0bf1e36c21bbdb1fe90b2a164d
ruby-1.8.1-7.EL4.8.x86_64.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
e1ca7dc2948b567cd8ec699f8c129cdc
ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm
e68e89288eda0c91f8287cc080868f3b
ruby-devel-1.8.1-7.EL4.8.x86_64.rpm
035dfd2e2bdd2a3931d68916f94013f6
ruby-docs-1.8.1-7.EL4.8.x86_64.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
afb9170ccc4afc036fbba4da3e537d1c
ruby-libs-1.8.1-7.EL4.8.x86_64.rpm
3f844cb4f8f32adddf8759b7a0acae32
ruby-mode-1.8.1-7.EL4.8.x86_64.rpm
062adee9f9259527cfd8960a821e76e5
ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm
79a0839bc49b4954d3a6e8ba6448fce5
ruby-1.8.1-7.EL4.8.src.rpm
i386:
17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm
84135ec3cf941c0786b0b94ff8b8ce49
ruby-1.8.1-7.EL4.8.i386.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
8a6b1a06c6937ce066b72a1ac9cd4067
ruby-devel-1.8.1-7.EL4.8.i386.rpm
7bb1cdebaf73798c5324b84da3b4ff3c
ruby-docs-1.8.1-7.EL4.8.i386.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
05f985e7860daece4a8709dccda6214b
ruby-mode-1.8.1-7.EL4.8.i386.rpm
38e62459fb4f9c96a14f67a612385c9a
ruby-tcltk-1.8.1-7.EL4.8.i386.rpm
x86_64:
f90ab40469e260ce1e362ce345dd0783
irb-1.8.1-7.EL4.8.x86_64.rpm
0eef3d0bf1e36c21bbdb1fe90b2a164d
ruby-1.8.1-7.EL4.8.x86_64.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
e1ca7dc2948b567cd8ec699f8c129cdc
ruby-debuginfo-1.8.1-7.EL4.8.x86_64.rpm
e68e89288eda0c91f8287cc080868f3b
ruby-devel-1.8.1-7.EL4.8.x86_64.rpm
035dfd2e2bdd2a3931d68916f94013f6
ruby-docs-1.8.1-7.EL4.8.x86_64.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
afb9170ccc4afc036fbba4da3e537d1c
ruby-libs-1.8.1-7.EL4.8.x86_64.rpm
3f844cb4f8f32adddf8759b7a0acae32
ruby-mode-1.8.1-7.EL4.8.x86_64.rpm
062adee9f9259527cfd8960a821e76e5
ruby-tcltk-1.8.1-7.EL4.8.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ruby-1.8.1-7.EL4.8.src.rpm
79a0839bc49b4954d3a6e8ba6448fce5
ruby-1.8.1-7.EL4.8.src.rpm
i386:
17140b59c11052728d5090e1e2b7314e irb-1.8.1-7.EL4.8.i386.rpm
84135ec3cf941c0786b0b94ff8b8ce49
ruby-1.8.1-7.EL4.8.i386.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
8a6b1a06c6937ce066b72a1ac9cd4067
ruby-devel-1.8.1-7.EL4.8.i386.rpm
7bb1cdebaf73798c5324b84da3b4ff3c
ruby-docs-1.8.1-7.EL4.8.i386.rpm
4b254e60191d331a07aebf305edfb501
ruby-libs-1.8.1-7.EL4.8.i386.rpm
05f985e7860daece4a8709dccda6214b
ruby-mode-1.8.1-7.EL4.8.i386.rpm
38e62459fb4f9c96a14f67a612385c9a
ruby-tcltk-1.8.1-7.EL4.8.i386.rpm
ia64:
3ba797719ac856a9a32af725fa524343 irb-1.8.1-7.EL4.8.ia64.rpm
e4c7a149c0ca0c16aa129d9908d27707
ruby-1.8.1-7.EL4.8.ia64.rpm
a8fb82bd7cc47506e2e9bfbfed365579
ruby-debuginfo-1.8.1-7.EL4.8.i386.rpm
7d46029096751904c8257f61df081206
ruby-debuginfo-1.8.1-7.EL4.8.i