Debian GNU/Linux
Debian Security Advisory DSA 1191-1 [email protected]
http://www.debian.org/security/
Martin Schulze
October 5th, 2006 http://www.debian.org/security/faq
Package : mozilla-thunderbird
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566
CVE-2006-4568 CVE-2006-4570 CVE-2006-4571
BugTraq ID : 20042
Several security related problems have been discovered in
Mozilla and derived products such as Mozilla Thunderbird. The
Common Vulnerabilities and Exposures project identifies the
following vulnerabilities:
CVE-2006-2788
Fernando Ribeiro discovered that a vulnerability in the
getRawDER functionallows remote attackers to cause a denial of
service (hang) and possibly execute arbitrary code.
CVE-2006-4340
Daniel Bleichenbacher recently described an implementation error
in RSA signature verification that cause the application to
incorrectly trust SSL certificates.
CVE-2006-4565, CVE-2006-4566
Priit Laes reported that that a JavaScript regular expression
can trigger a heap-based buffer overflow which allows remote
attackers to cause a denial of service and possibly execute
arbitrary code.
CVE-2006-4568
A vulnerability has been discovered that allows remote attackers
to bypass the security model and inject content into the sub-frame
of another site.
CVE-2006-4570
Georgi Guninski demonstrated that even with JavaScript disabled
in mail (the default) an attacker can still execute JavaScript when
a mail message is viewed, replied to, or forwarded.
CVE-2006-4571
Multiple unspecified vulnerabilities in Firefox, Thunderbird and
SeaMonkey allow remote attackers to cause a denial of service,
corrupt memory, and possibly execute arbitrary code.
For the stable distribution (sarge) these problems have been
fixed in version 1.0.2-2.sarge1.0.8c.1.
For the unstable distribution (sid) these problems have been
fixed in version 1.5.0.7-1.
We recommend that you upgrade your Mozilla Thunderbird
packages.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
Source archives:
Size/MD5 checksum: 1003
d7261fba347b9876e873f1d424e60190
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8c.1.diff.gz
Size/MD5 checksum: 519315
066ed351050722c36274e3e837fd174f
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz
Size/MD5 checksum: 33288906
806175393a226670aa66060452d31df4
Alpha architecture:
Size/MD5 checksum: 12855288
285e55a20445ea5dffe79de01baf788c
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 3280106
0206d9fe08e3da2d4bf919c6b2b54ec7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 152092
c5c984f0f11f94cb263f5bbef367de09
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 33520
ed7e6d825f630da666e07914527f2c75
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_alpha.deb
Size/MD5 checksum: 89492
1e9ed565915dc4327e444ad999cc5daa
AMD64 architecture:
Size/MD5 checksum: 12258904
f40f86252184ce7360b2b9d1e58cef8f
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 3281164
e4e2160d22d4721508f1762804b3b18b
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 151124
a72d17f827929c9189f9ba96ff73c7a1
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 33512
bbe0fe4a7e56a138c220790ab9de97a6
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_amd64.deb
Size/MD5 checksum: 89350
f2b7e1d1d4eb5f1abb2522ddbdb46ff5
ARM architecture:
Size/MD5 checksum: 10345146
4c171699433072d443eb7b35a2550fd2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 3272118
a52ad3d2cd1806e936374537e135d7db
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 143266
9dedbe9b5f45727a93cfccb5c99bf371
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 33522
14d1c0d0af46731075ea7c35c2900258
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_arm.deb
Size/MD5 checksum: 81318
81219b4c82896fab12427e42df1b2760
HP Precision architecture:
Size/MD5 checksum: 13570024
3a62ee11075402dfad030e2ede937191
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 3285124
e9cadee2d32b2bcb56b1278043e97da4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 153296
3fecaa707002afb1ba6854da724ad132
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 33520
83e537b9aff4d44fd958043298a1d7f2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_hppa.deb
Size/MD5 checksum: 97390
c3ceeedcf00d99d34c7b5f424da7da63
Intel IA-32 architecture:
Size/MD5 checksum: 11568436
af1de65bd715970c4432149aec80b2a2
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 3507870
5dab89db24f1443fe782dc931f4ee0af
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 146732
bc52082cd1ab0f026c401204cd63b4a7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 33518
5d3c9700cce7b9c0261c246ed7b8afd4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_i386.deb
Size/MD5 checksum: 88084
e244c9c8b7224814774bef13f4213d4e
Intel IA-64 architecture:
Size/MD5 checksum: 14628630
07bfcc171f449b86b9d62f903e29d506
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 3291260
d7186841974796f8f90be26700801a95
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 155452
e17eb664e56fcc0809dd36580f92cc1a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 33514
fc890529fdea5526a05ffd16b96f5956
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_ia64.deb
Size/MD5 checksum: 107220
eb93528d586b050ecc3b60742b4fa344
Motorola 680×0 architecture:
Size/MD5 checksum: 10794842
fa716b92e3c7a9d67fad6fd453c78bb4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 3271690
d95eb910dd6d38de41c17fcb6b1c4696
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 145054
2b7570676e15cea809905c442f91b5e0
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 33550
3db6c520d1c489fb4e17501d19dececf
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_m68k.deb
Size/MD5 checksum: 82556
32d25c11844a48ed963e3c5c51ff34fc
Big endian MIPS architecture:
Size/MD5 checksum: 11948708
4f58ce9668da6a12b823edaa3c8b35b3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 3279410
e639b2bf43eda95d3ca3bb0b9aec6df7
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 148042
cb6ee4a9bd4dec3166e48e356b9c3465
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 33524
2765555b00f4ed717b34e98c5c0d9c02
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mips.deb
Size/MD5 checksum: 84748
0e934e90bb6bd47c7500fd665728ba27
Little endian MIPS architecture:
Size/MD5 checksum: 11817078
4239077894c74444d33063229dd847df
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 3280416
ac165850436e63818da8fffe134628d1
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 147600
ae6d7ff1b34dddab3d0c18d6e38bc77b
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 33518
27bed1b95a4e34a291c7e67c6a9fdd37
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_mipsel.deb
Size/MD5 checksum: 84650
173fefc8b58b15398b3cccad2c812495
PowerPC architecture:
Size/MD5 checksum: 10912494
d13ec5b97f5fde0795e5f762330756f6
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 3270108
dbd7eb3154db4a379fcfcda6b7d414b9
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 145048
b9ab45845f58fb064d7d1ae449481db9
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 33526
b5e07e26d215581b4cc0fea6d71beaf3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_powerpc.deb
Size/MD5 checksum: 81478
b57b8038afbfd5490a6cf847e740ab60
IBM S/390 architecture:
Size/MD5 checksum: 12705708
68195861caccd07a18a379ffe2e88403
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 3280614
38dec996622a4e1762a1ef683bba9c43
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 151436
b54ba7420653e63746d019b979f3ae76
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 33516
e24dafe27c103a8d40de9a905b052311
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_s390.deb
Size/MD5 checksum: 89290
9daa1eb634834e02aefde0a594bcd0f9
Sun Sparc architecture:
Size/MD5 checksum: 11181284
adedd4c6302ddb868a531810d226143a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 3275816
c38922ec47674939277e6984f87c0eb4
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 144702
9183a627463aa564a0313d4d361d22f3
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 33528
5f87736faa9ee0a9b10e29c48280798a
http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8c.1_sparc.deb
Size/MD5 checksum: 83122
72966880dc02a1b472dcac7b1404fa58
These files will probably be moved into the stable distribution
on its next update.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>
Red Hat Linux
Red Hat Security Advisory
Synopsis: Important: php security update
Advisory ID: RHSA-2006:0688-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0688.html
Issue date: 2006-10-05
Updated on: 2006-10-05
Product: Red Hat Application Stack
CVE Names: CVE-2006-4020 CVE-2006-4482 CVE-2006-4484 CVE-2006-4485
CVE-2006-4486 CVE-2006-4812
1. Summary:
Updated PHP packages that fix multiple security issues are now
available for the Red Hat Application Stack.
This update has been rated as having important security impact
by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Application Stack v1 for Enterprise Linux AS (v.4) –
i386, x86_64
Red Hat Application Stack v1 for Enterprise Linux ES (v.4) – i386,
x86_64
3. Problem description:
PHP is an HTML-embedded scripting language commonly used with
the Apache HTTP Web server.
An integer overflow was discovered in the PHP memory handling
routines. If a script can cause memory allocation based on
untrusted user data, a remote attacker sending a carefully crafted
request could execute arbitrary code as the ‘apache’ user.
(CVE-2006-4812)
A buffer overflow was discovered in the PHP sscanf() function.
If a script used the sscanf() function with positional arguments in
the format string, a remote attacker sending a carefully crafted
request could execute arbitrary code as the ‘apache’ user.
(CVE-2006-4020)
An integer overflow was discovered in the PHP wordwrap() and
str_repeat() functions. If a script running on a 64-bit server used
either of these functions on untrusted user data, a remote attacker
sending a carefully crafted request might be able to cause a heap
overflow. (CVE-2006-4482)
A buffer overflow was discovered in the PHP gd extension. If a
script was set up to process GIF images from untrusted sources
using the gd extension, a remote attacker could cause a heap
overflow. (CVE-2006-4484)
A buffer overread was discovered in the PHP stripos() function.
If a script used the stripos() function with untrusted user data,
PHP may read past the end of a buffer, which could allow a denial
of service attack by a remote user. (CVE-2006-4485)
An integer overflow was discovered in the PHP memory allocation
handling. On 64-bit platforms, the “memory_limit” setting was not
enforced correctly, which could allow a denial of service attack by
a remote user. (CVE-2006-4486)
These packages also contain a fix for a bug where certain input
strings to the metaphone() function could cause memory
corruption.
Users of PHP should upgrade to these updated packages, which
contain backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
207090 – CVE-2006-4020 PHP security issues (CVE-2006-4482
CVE-2006-4484 CVE-2006-4485 CVE-2006-4486)
209408 – CVE-2006-4812 PHP ecalloc integer overflow
6. RPMs required:
Red Hat Application Stack v1 for Enterprise Linux AS (v.4):
SRPMS:
ftp://updates.redhat.com/4AS-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.4.src.rpm
8450536ffd216fffd7a2c350ef2d8122
php-5.1.4-1.el4s1.4.src.rpm
i386:
d8504a875caf435ac3d87be51da23cbb
php-5.1.4-1.el4s1.4.i386.rpm
0b093ab3604f91f031e77fc374851333
php-bcmath-5.1.4-1.el4s1.4.i386.rpm
be94330943e42d6ce9795ac1aa005c5c
php-dba-5.1.4-1.el4s1.4.i386.rpm
6a69ac6b8f30363beb5eb774ae8a7582
php-debuginfo-5.1.4-1.el4s1.4.i386.rpm
89e204920cedc8129dca821268de2fdb
php-devel-5.1.4-1.el4s1.4.i386.rpm
9404807f4baab567cebf50e00dc0328c
php-gd-5.1.4-1.el4s1.4.i386.rpm
c08f52b6d7dbb729e09f4b95f89562b1
php-imap-5.1.4-1.el4s1.4.i386.rpm
9944e216a9b9d6b06a73d620e2d5a26e
php-ldap-5.1.4-1.el4s1.4.i386.rpm
399033da724e5d135fbd4c5bea8641a3
php-mbstring-5.1.4-1.el4s1.4.i386.rpm
8cdb68afa789a1744f9c0cc4cb25f680
php-mysql-5.1.4-1.el4s1.4.i386.rpm
80b3a6b0e0b029255fea1ae1b892b3a8
php-ncurses-5.1.4-1.el4s1.4.i386.rpm
67fe4b574af94f99e22042e0b1b0617d
php-odbc-5.1.4-1.el4s1.4.i386.rpm
f3794d4b2cc0c41efb3029efea456129
php-pdo-5.1.4-1.el4s1.4.i386.rpm
ff9b98642ebf3726ab189b8b07c78cf4
php-pgsql-5.1.4-1.el4s1.4.i386.rpm
42144bb23cfba2f20967d280f6bc4087
php-snmp-5.1.4-1.el4s1.4.i386.rpm
dfe2fdeecd4fc439bad8c05e2abdefac
php-soap-5.1.4-1.el4s1.4.i386.rpm
877b079373e5d1809d7c4e092b04c12a
php-xml-5.1.4-1.el4s1.4.i386.rpm
b2a43cb90b877484085c562d931daa06
php-xmlrpc-5.1.4-1.el4s1.4.i386.rpm
x86_64:
21e04b311dc5f7b9bef079dc1dbdd01a
php-5.1.4-1.el4s1.4.x86_64.rpm
372a46e2847f69de0b14ca16cb43eaf3
php-bcmath-5.1.4-1.el4s1.4.x86_64.rpm
23531793db020c866ebe475fcddf750d
php-dba-5.1.4-1.el4s1.4.x86_64.rpm
5327f3805a18b235140ba91ece545400
php-debuginfo-5.1.4-1.el4s1.4.x86_64.rpm
db2a441639cae736640e13ab7cbe133a
php-devel-5.1.4-1.el4s1.4.x86_64.rpm
1634a9dc26e120084a6fe49262e0f0e0
php-gd-5.1.4-1.el4s1.4.x86_64.rpm
45becd8779a8da71b139b1ba3ee9400e
php-imap-5.1.4-1.el4s1.4.x86_64.rpm
3b2ef5dede854065651495602fa6c126
php-ldap-5.1.4-1.el4s1.4.x86_64.rpm
5d27f29c72f624c1a868f3cdbefd0b77
php-mbstring-5.1.4-1.el4s1.4.x86_64.rpm
edaafb7eca7e3c41acbf69259c525d14
php-mysql-5.1.4-1.el4s1.4.x86_64.rpm
c15c8d27058ad09b838a53b4f4c81b6e
php-ncurses-5.1.4-1.el4s1.4.x86_64.rpm
d888187eb18ffa7f46550138d84700fa
php-odbc-5.1.4-1.el4s1.4.x86_64.rpm
6d5d2387c96663442bf90b9a2cb45253
php-pdo-5.1.4-1.el4s1.4.x86_64.rpm
c68935c8f98ea97fc468c173c6d36509
php-pgsql-5.1.4-1.el4s1.4.x86_64.rpm
a7ac3a5427b16926fae2e91f347ea585
php-snmp-5.1.4-1.el4s1.4.x86_64.rpm
8143af224065383c5518c5f0b8764fb2
php-soap-5.1.4-1.el4s1.4.x86_64.rpm
1255ae1a27002b314951340ef15d886f
php-xml-5.1.4-1.el4s1.4.x86_64.rpm
19d384ad3ccaf7fa73c21ffa7ff012c8
php-xmlrpc-5.1.4-1.el4s1.4.x86_64.rpm
Red Hat Application Stack v1 for Enterprise Linux ES (v.4):
SRPMS:
ftp://updates.redhat.com/4ES-RHWAS/en/os/SRPMS/php-5.1.4-1.el4s1.4.src.rpm
8450536ffd216fffd7a2c350ef2d8122
php-5.1.4-1.el4s1.4.src.rpm
i386:
d8504a875caf435ac3d87be51da23cbb
php-5.1.4-1.el4s1.4.i386.rpm
0b093ab3604f91f031e77fc374851333
php-bcmath-5.1.4-1.el4s1.4.i386.rpm
be94330943e42d6ce9795ac1aa005c5c
php-dba-5.1.4-1.el4s1.4.i386.rpm
6a69ac6b8f30363beb5eb774ae8a7582
php-debuginfo-5.1.4-1.el4s1.4.i386.rpm
89e204920cedc8129dca821268de2fdb
php-devel-5.1.4-1.el4s1.4.i386.rpm
9404807f4baab567cebf50e00dc0328c
php-gd-5.1.4-1.el4s1.4.i386.rpm
c08f52b6d7dbb729e09f4b95f89562b1
php-imap-5.1.4-1.el4s1.4.i386.rpm
9944e216a9b9d6b06a73d620e2d5a26e
php-ldap-5.1.4-1.el4s1.4.i386.rpm
399033da724e5d135fbd4c5bea8641a3
php-mbstring-5.1.4-1.el4s1.4.i386.rpm
8cdb68afa789a1744f9c0cc4cb25f680
php-mysql-5.1.4-1.el4s1.4.i386.rpm
80b3a6b0e0b029255fea1ae1b892b3a8
php-ncurses-5.1.4-1.el4s1.4.i386.rpm
67fe4b574af94f99e22042e0b1b0617d
php-odbc-5.1.4-1.el4s1.4.i386.rpm
f3794d4b2cc0c41efb3029efea456129
php-pdo-5.1.4-1.el4s1.4.i386.rpm
ff9b98642ebf3726ab189b8b07c78cf4
php-pgsql-5.1.4-1.el4s1.4.i386.rpm
42144bb23cfba2f20967d280f6bc4087
php-snmp-5.1.4-1.el4s1.4.i386.rpm
dfe2fdeecd4fc439bad8c05e2abdefac
php-soap-5.1.4-1.el4s1.4.i386.rpm
877b079373e5d1809d7c4e092b04c12a
php-xml-5.1.4-1.el4s1.4.i386.rpm
b2a43cb90b877484085c562d931daa06
php-xmlrpc-5.1.4-1.el4s1.4.i386.rpm
x86_64:
21e04b311dc5f7b9bef079dc1dbdd01a
php-5.1.4-1.el4s1.4.x86_64.rpm
372a46e2847f69de0b14ca16cb43eaf3
php-bcmath-5.1.4-1.el4s1.4.x86_64.rpm
23531793db020c866ebe475fcddf750d
php-dba-5.1.4-1.el4s1.4.x86_64.rpm
5327f3805a18b235140ba91ece545400
php-debuginfo-5.1.4-1.el4s1.4.x86_64.rpm
db2a441639cae736640e13ab7cbe133a
php-devel-5.1.4-1.el4s1.4.x86_64.rpm
1634a9dc26e120084a6fe49262e0f0e0
php-gd-5.1.4-1.el4s1.4.x86_64.rpm
45becd8779a8da71b139b1ba3ee9400e
php-imap-5.1.4-1.el4s1.4.x86_64.rpm
3b2ef5dede854065651495602fa6c126
php-ldap-5.1.4-1.el4s1.4.x86_64.rpm
5d27f29c72f624c1a868f3cdbefd0b77
php-mbstring-5.1.4-1.el4s1.4.x86_64.rpm
edaafb7eca7e3c41acbf69259c525d14
php-mysql-5.1.4-1.el4s1.4.x86_64.rpm
c15c8d27058ad09b838a53b4f4c81b6e
php-ncurses-5.1.4-1.el4s1.4.x86_64.rpm
d888187eb18ffa7f46550138d84700fa
php-odbc-5.1.4-1.el4s1.4.x86_64.rpm
6d5d2387c96663442bf90b9a2cb45253
php-pdo-5.1.4-1.el4s1.4.x86_64.rpm
c68935c8f98ea97fc468c173c6d36509
php-pgsql-5.1.4-1.el4s1.4.x86_64.rpm
a7ac3a5427b16926fae2e91f347ea585
php-snmp-5.1.4-1.el4s1.4.x86_64.rpm
8143af224065383c5518c5f0b8764fb2
php-soap-5.1.4-1.el4s1.4.x86_64.rpm
1255ae1a27002b314951340ef15d886f
php-xml-5.1.4-1.el4s1.4.x86_64.rpm
19d384ad3ccaf7fa73c21ffa7ff012c8
php-xmlrpc-5.1.4-1.el4s1.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4482
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4485
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4486
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812
http://www.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <[email protected]>. More
contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc.
Red Hat Security Advisory
Synopsis: Important: kernel security update
Advisory ID: RHSA-2006:0689-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0689.html
Issue date: 2006-10-05
Updated on: 2006-10-05
Product: Red Hat Enterprise Linux
Keywords: nahant kernel update
Obsoletes: RHSA-2006:0617
CVE Names: CVE-2005-4811 CVE-2006-0039 CVE-2006-2071 CVE-2006-3741
CVE-2006-4093 CVE-2006-4535 CVE-2006-4623 CVE-2006-4997
1. Summary:
Updated kernel packages that fix several security issues in the
Red Hat Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important
security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating
system.
These new kernel packages contain fixes for the security issues
described below:
- a flaw in the SCTP support that allowed a local user to cause a
denial of service (crash) with a specific SO_LINGER value.
(CVE-2006-4535, Important) - a flaw in the hugepage table support that allowed a local user
to cause a denial of service (crash). (CVE-2005-4811,
Important) - a flaw in the mprotect system call that allowed setting write
permission for a read-only attachment of shared memory.
(CVE-2006-2071, Moderate) - a flaw in HID0[31] (en_attn) register handling on PowerPC 970
systems that allowed a local user to cause a denial of service.
(crash) (CVE-2006-4093, Moderate) - a flaw in the perfmon support of Itanium systems that allowed a
local user to cause a denial of service by consuming all file
descriptors. (CVE-2006-3741, Moderate) - a flaw in the ATM subsystem. On systems with installed ATM
hardware and configured ATM support, a remote user could cause a
denial of service (panic) by accessing socket buffers memory after
freeing them. (CVE-2006-4997, Moderate) - a flaw in the DVB subsystem. On systems with installed DVB
hardware and configured DVB support, a remote user could cause a
denial of service (panic) by sending a ULE SNDU packet with length
of 0. (CVE-2006-4623, Low) - an information leak in the network subsystem that possibly
allowed a local user to read sensitive data from kernel memory.
(CVE-2006-0039, Low)
In addition, two bugfixes for the IPW-2200 wireless driver were
included. The first one ensures that wireless management
applications correctly identify IPW-2200 controlled devices, while
the second fix ensures that DHCP requests using the IPW-2200
operate correctly.
Red Hat would like to thank Olof Johansson, Stephane Eranian and
Solar Designer for reporting issues fixed in this erratum.
All Red Hat Enterprise Linux 4 users are advised to upgrade
their kernels to the packages associated with their machine
architectures and configurations as listed in this erratum.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
165345 – CVE-2005-4811 Hugepage crash on failing mmap()
190073 – CVE-2006-2071 mprotect gives write permission to a
readonly attachment
191698 – CVE-2006-0039 netfilter do_add_counters race
198820 – IPW2200 /proc/net/wireless file fields are empty
201684 – CVE-2006-4093 Local DoS through uncleared HID0[31]
203421 – Grabbing DHCP address via wireless not always
successful
204360 – CVE-2006-3741 sys_perfmonctl() file descriptor reference
count issue
204460 – CVE-2006-4535 Regression with fix for SCTP abort issue
204912 – CVE-2006-4623 Wrong handling of DVB ULE SNDU with length
of 0
206265 – CVE-2006-4997 IP over ATM clip_mkip dereference freed
pointer
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78
kernel-2.6.9-42.0.3.EL.src.rpm
i386:
97c7b0d569b80ea7a86ad7181655b394
kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07
kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf
kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51
kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm
ia64:
f059a2e3b41e897b513913dab047bdfe
kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac
kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06
kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm
ppc:
6baa19f3ae93e40964d2135d7a80065f
kernel-2.6.9-42.0.3.EL.ppc64.rpm
6037e7111ab58581b876d3b73b5f108d
kernel-2.6.9-42.0.3.EL.ppc64iseries.rpm
d6dcd6b280380d5c5081dcd049fef1d1
kernel-debuginfo-2.6.9-42.0.3.EL.ppc64.rpm
859239f1d7f0f1dfca757484f9e6862a
kernel-debuginfo-2.6.9-42.0.3.EL.ppc64iseries.rpm
2a368faf439a27e41ee5ad12f7dc5379
kernel-devel-2.6.9-42.0.3.EL.ppc64.rpm
92b5cf3acf2659eadb313c73bf0624b1
kernel-devel-2.6.9-42.0.3.EL.ppc64iseries.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
1407d3d79e6f458de7c472f366d131f5
kernel-largesmp-2.6.9-42.0.3.EL.ppc64.rpm
86e0a6e1a3ba621a69eacea525c8421d
kernel-largesmp-devel-2.6.9-42.0.3.EL.ppc64.rpm
s390:
43411689ca8b3299a050eaacb5ccc6c4
kernel-2.6.9-42.0.3.EL.s390.rpm
8452548f0b60e38dab481598b2700e93
kernel-debuginfo-2.6.9-42.0.3.EL.s390.rpm
587ef66883f9b699dbc774507c605548
kernel-devel-2.6.9-42.0.3.EL.s390.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
s390x:
a1b4a15fe3273edc6604e7a5472b96bd
kernel-2.6.9-42.0.3.EL.s390x.rpm
b048694685cbfa12297f3e02fa2d6fc3
kernel-debuginfo-2.6.9-42.0.3.EL.s390x.rpm
72fca784b40da07865a38c474b320a11
kernel-devel-2.6.9-42.0.3.EL.s390x.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7
kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba
kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180
kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5
kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78
kernel-2.6.9-42.0.3.EL.src.rpm
i386:
97c7b0d569b80ea7a86ad7181655b394
kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07
kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf
kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51
kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm
x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7
kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba
kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180
kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5
kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78
kernel-2.6.9-42.0.3.EL.src.rpm
i386:
97c7b0d569b80ea7a86ad7181655b394
kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07
kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf
kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51
kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm
ia64:
f059a2e3b41e897b513913dab047bdfe
kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac
kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06
kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm
x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7
kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba
kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
2fb84f86fdf056b590575fff23fec180
kernel-largesmp-2.6.9-42.0.3.EL.x86_64.rpm
7b3e033a5e89a92a65001485ff80612c
kernel-largesmp-devel-2.6.9-42.0.3.EL.x86_64.rpm
c7c7e7656ac857faa3d202343462f6b5
kernel-smp-2.6.9-42.0.3.EL.x86_64.rpm
337fc3145a243e23207c74626b2c9a14
kernel-smp-devel-2.6.9-42.0.3.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-42.0.3.EL.src.rpm
c37a516dd84b1cf30988733b80cdde78
kernel-2.6.9-42.0.3.EL.src.rpm
i386:
97c7b0d569b80ea7a86ad7181655b394
kernel-2.6.9-42.0.3.EL.i686.rpm
3ce48424de3cf73b639fa058c7d286bb
kernel-debuginfo-2.6.9-42.0.3.EL.i686.rpm
ce6b4e0e36cff5d1d6c2fa354543bb07
kernel-devel-2.6.9-42.0.3.EL.i686.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
6a8b8167ddef9ddfe724401da165c4cf
kernel-hugemem-2.6.9-42.0.3.EL.i686.rpm
5a6aea58f763dafecec369d68f5b0b80
kernel-hugemem-devel-2.6.9-42.0.3.EL.i686.rpm
beae36ad8d86d16bed5fda24c1365e51
kernel-smp-2.6.9-42.0.3.EL.i686.rpm
0ac9f3738ac9180a1fa4fcc37c88a1ee
kernel-smp-devel-2.6.9-42.0.3.EL.i686.rpm
ia64:
f059a2e3b41e897b513913dab047bdfe
kernel-2.6.9-42.0.3.EL.ia64.rpm
c10007676513fcfa07cabd4520562cd0
kernel-debuginfo-2.6.9-42.0.3.EL.ia64.rpm
c9eb612e4e006ea696d0e49ad6944aac
kernel-devel-2.6.9-42.0.3.EL.ia64.rpm
956dfa20406d710f2925191beb35b60e
kernel-doc-2.6.9-42.0.3.EL.noarch.rpm
c889418bf058b9f2ce28de616ad80f06
kernel-largesmp-2.6.9-42.0.3.EL.ia64.rpm
fb887a06a9a31a5da5f72df3a1b38ebc
kernel-largesmp-devel-2.6.9-42.0.3.EL.ia64.rpm
x86_64:
a11a4627b70e6d3d29d8ec1b57486ff7
kernel-2.6.9-42.0.3.EL.x86_64.rpm
bbe30bd45965df83b8172d03262dc578
kernel-debuginfo-2.6.9-42.0.3.EL.x86_64.rpm
3b123b8d1c519099e7253fb0210388ba
kernel-devel-2.6.9-42.0.3.EL.x86_64.rpm