Gentoo Linux
Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200609-05:02
Severity: Normal
Title: OpenSSL, AMD64 x86 emulation base libraries: RSA signature
forgery
Date: September 07, 2006
Updated: September 08, 2006
Bugs: #146375, #146438
ID: 200609-05:02
Errata
The package name for the AMD64 x86 emulation base libraries was
incorrect.
The corrected sections appear below.
Affected packages
Package / Vulnerable / Unaffected
1 openssl < 0.9.7k >= 0.9.7k 2 emul-linux-x86-baselibs < 2.5.2 >= 2.5.2 ------------------------------------------------------------------- # Package 2 [app-emulation/emul-linux-x86-baselibs] only applies to AMD64 users. NOTE: Any packages listed without architecture tags apply to all architectures... ------------------------------------------------------------------- 2 affected packages
Resolution
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7k"
All AMD64 x86 emulation base libraries users should upgrade to
the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.2"
Availability
This GLSA and any updates to it are available for viewing at the
Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200609-05.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or
alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2006 Gentoo Foundation, Inc; referenced text belongs
to its owner(s).
The contents of this document are licensed under the Creative
Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Red Hat Linux
Red Hat Security Advisory
Synopsis: Low: wireshark security update
Advisory ID: RHSA-2006:0658-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0658.html
Issue date: 2006-09-12
Updated on: 2006-09-12
Product: Red Hat Enterprise Linux
Keywords: ethereal
CVE Names: CVE-2006-4330 CVE-2006-4331 CVE-2006-4333
1. Summary:
New Wireshark packages that fix various security vulnerabilities
are now available. Wireshark was previously known as Ethereal.
This update has been rated as having low security impact by the
Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386, ia64
Red Hat Linux Advanced Workstation 2.1 – ia64
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
Wireshark is a program for monitoring network traffic.
Bugs were found in Wireshark’s SCSI and SSCOP protocol
dissectors. Ethereal could crash or stop responding if it read a
malformed packet off the network. (CVE-2006-4330,
CVE-2006-4333)
An off-by-one bug was found in the IPsec ESP decryption
preference parser. Ethereal could crash or stop responding if it
read a malformed packet off the network. (CVE-2006-4331)
Users of Wireshark or Ethereal should upgrade to these updated
packages containing Wireshark version 0.99.3, which is not
vulnerable to these issues. These packages also fix a bug in the
PAM configuration of the Wireshark packages which prevented
non-root users starting a capture.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
204045 – CVE-2006-4330 Wireshark security issues (CVE-2006-4331
CVE-2006-4333) 204066 – wireshark doesn’t work as non root user
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/wireshark-0.99.3-AS21.4.src.rpm
d3200dcb4d24c6433818a2f606a60773
wireshark-0.99.3-AS21.4.src.rpm
i386:
3544a00f0fc316d5cd93cf97d131bf8f
wireshark-0.99.3-AS21.4.i386.rpm
90c06f72a357ba20f0036b91a1fa5dbf
wireshark-gnome-0.99.3-AS21.4.i386.rpm
ia64:
231dd0a5044cead3e1941e2003399756
wireshark-0.99.3-AS21.4.ia64.rpm
b5779496a82156f5b920fac41b04c08d
wireshark-gnome-0.99.3-AS21.4.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/wireshark-0.99.3-AS21.4.src.rpm
d3200dcb4d24c6433818a2f606a60773
wireshark-0.99.3-AS21.4.src.rpm
ia64:
231dd0a5044cead3e1941e2003399756
wireshark-0.99.3-AS21.4.ia64.rpm
b5779496a82156f5b920fac41b04c08d
wireshark-gnome-0.99.3-AS21.4.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/wireshark-0.99.3-AS21.4.src.rpm
d3200dcb4d24c6433818a2f606a60773
wireshark-0.99.3-AS21.4.src.rpm
i386:
3544a00f0fc316d5cd93cf97d131bf8f
wireshark-0.99.3-AS21.4.i386.rpm
90c06f72a357ba20f0036b91a1fa5dbf
wireshark-gnome-0.99.3-AS21.4.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/wireshark-0.99.3-AS21.4.src.rpm
d3200dcb4d24c6433818a2f606a60773
wireshark-0.99.3-AS21.4.src.rpm
i386:
3544a00f0fc316d5cd93cf97d131bf8f
wireshark-0.99.3-AS21.4.i386.rpm
90c06f72a357ba20f0036b91a1fa5dbf
wireshark-gnome-0.99.3-AS21.4.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/wireshark-0.99.3-EL3.2.src.rpm
976f671ab5fbb0cf05744c855c2c8cd7
wireshark-0.99.3-EL3.2.src.rpm
i386:
cabf7c0479616ec25228b5a51ee27a2f
wireshark-0.99.3-EL3.2.i386.rpm
0e4af32a74b5402422d5ffeeca5ba78e
wireshark-debuginfo-0.99.3-EL3.2.i386.rpm
034c036e86bdae40138b400d751eb04b
wireshark-gnome-0.99.3-EL3.2.i386.rpm
ia64:
073f1d89f75db78abc6df4fb2ec5b3da
wireshark-0.99.3-EL3.2.ia64.rpm
a9bd2bb59607f803dd662dbe394bd85c
wireshark-debuginfo-0.99.3-EL3.2.ia64.rpm
94f8bf6787f86df0d7106a2d87b6aa50
wireshark-gnome-0.99.3-EL3.2.ia64.rpm
ppc:
063c862c6db50948528c06c7b91989da
wireshark-0.99.3-EL3.2.ppc.rpm
818d7af14ea11bfc45eaa03ab1100fe8
wireshark-debuginfo-0.99.3-EL3.2.ppc.rpm
7b07f3460348b3233f9f16fa77fc1277
wireshark-gnome-0.99.3-EL3.2.ppc.rpm
s390:
61d80599bd3763f05721f5eae996b261
wireshark-0.99.3-EL3.2.s390.rpm
6eff5f3177a9d5d052fce2efdd7bfbb5
wireshark-debuginfo-0.99.3-EL3.2.s390.rpm
129125e4d3ef2dbd8dd35b031c6f63e3
wireshark-gnome-0.99.3-EL3.2.s390.rpm
s390x:
fbc16e924f34ba2136fd5a758f42e10c
wireshark-0.99.3-EL3.2.s390x.rpm
f2e252d0ab8e2267bae48ef6f8814a03
wireshark-debuginfo-0.99.3-EL3.2.s390x.rpm
f9c9d505f026c47cc9a4e911c934f33c
wireshark-gnome-0.99.3-EL3.2.s390x.rpm
x86_64:
48c2eb46f3b7c5abd9f1ccde2670ef3c
wireshark-0.99.3-EL3.2.x86_64.rpm
a500d68f9bd6d33e50c2ce375cbad915
wireshark-debuginfo-0.99.3-EL3.2.x86_64.rpm
765dd50be28bca3c0c3442829c103fdb
wireshark-gnome-0.99.3-EL3.2.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/wireshark-0.99.3-EL3.2.src.rpm
976f671ab5fbb0cf05744c855c2c8cd7
wireshark-0.99.3-EL3.2.src.rpm
i386:
cabf7c0479616ec25228b5a51ee27a2f
wireshark-0.99.3-EL3.2.i386.rpm
0e4af32a74b5402422d5ffeeca5ba78e
wireshark-debuginfo-0.99.3-EL3.2.i386.rpm
034c036e86bdae40138b400d751eb04b
wireshark-gnome-0.99.3-EL3.2.i386.rpm
x86_64:
48c2eb46f3b7c5abd9f1ccde2670ef3c
wireshark-0.99.3-EL3.2.x86_64.rpm
a500d68f9bd6d33e50c2ce375cbad915
wireshark-debuginfo-0.99.3-EL3.2.x86_64.rpm
765dd50be28bca3c0c3442829c103fdb
wireshark-gnome-0.99.3-EL3.2.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/wireshark-0.99.3-EL3.2.src.rpm
976f671ab5fbb0cf05744c855c2c8cd7
wireshark-0.99.3-EL3.2.src.rpm
i386:
cabf7c0479616ec25228b5a51ee27a2f
wireshark-0.99.3-EL3.2.i386.rpm
0e4af32a74b5402422d5ffeeca5ba78e
wireshark-debuginfo-0.99.3-EL3.2.i386.rpm
034c036e86bdae40138b400d751eb04b
wireshark-gnome-0.99.3-EL3.2.i386.rpm
ia64:
073f1d89f75db78abc6df4fb2ec5b3da
wireshark-0.99.3-EL3.2.ia64.rpm
a9bd2bb59607f803dd662dbe394bd85c
wireshark-debuginfo-0.99.3-EL3.2.ia64.rpm
94f8bf6787f86df0d7106a2d87b6aa50
wireshark-gnome-0.99.3-EL3.2.ia64.rpm
x86_64:
48c2eb46f3b7c5abd9f1ccde2670ef3c
wireshark-0.99.3-EL3.2.x86_64.rpm
a500d68f9bd6d33e50c2ce375cbad915
wireshark-debuginfo-0.99.3-EL3.2.x86_64.rpm
765dd50be28bca3c0c3442829c103fdb
wireshark-gnome-0.99.3-EL3.2.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/wireshark-0.99.3-EL3.2.src.rpm
976f671ab5fbb0cf05744c855c2c8cd7
wireshark-0.99.3-EL3.2.src.rpm
i386:
cabf7c0479616ec25228b5a51ee27a2f
wireshark-0.99.3-EL3.2.i386.rpm
0e4af32a74b5402422d5ffeeca5ba78e
wireshark-debuginfo-0.99.3-EL3.2.i386.rpm
034c036e86bdae40138b400d751eb04b
wireshark-gnome-0.99.3-EL3.2.i386.rpm
ia64:
073f1d89f75db78abc6df4fb2ec5b3da
wireshark-0.99.3-EL3.2.ia64.rpm
a9bd2bb59607f803dd662dbe394bd85c
wireshark-debuginfo-0.99.3-EL3.2.ia64.rpm
94f8bf6787f86df0d7106a2d87b6aa50
wireshark-gnome-0.99.3-EL3.2.ia64.rpm
x86_64:
48c2eb46f3b7c5abd9f1ccde2670ef3c
wireshark-0.99.3-EL3.2.x86_64.rpm
a500d68f9bd6d33e50c2ce375cbad915
wireshark-debuginfo-0.99.3-EL3.2.x86_64.rpm
765dd50be28bca3c0c3442829c103fdb
wireshark-gnome-0.99.3-EL3.2.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/wireshark-0.99.3-EL4.2.src.rpm
26d719c5c61765eb774d08909617332a
wireshark-0.99.3-EL4.2.src.rpm
i386:
020a4db6438210df6463c3081f614068
wireshark-0.99.3-EL4.2.i386.rpm
83bed0df7d4d7ab66e7f714d0ad6e12e
wireshark-debuginfo-0.99.3-EL4.2.i386.rpm
2c3c5a956f42bd63eb6b7d788f70dd09
wireshark-gnome-0.99.3-EL4.2.i386.rpm
ia64:
87253ea0cbbaaaaab7ac5edfe8fcfd65
wireshark-0.99.3-EL4.2.ia64.rpm
79e4e54f464a9136fdcf9d1bdef1032e
wireshark-debuginfo-0.99.3-EL4.2.ia64.rpm
ddef33d5d9efa57e04efa8ff2c32792a
wireshark-gnome-0.99.3-EL4.2.ia64.rpm
ppc:
2b92533a5db47fae7841d0185249fbfc
wireshark-0.99.3-EL4.2.ppc.rpm
e64b46f75baa7f63b6aff70c20c64e02
wireshark-debuginfo-0.99.3-EL4.2.ppc.rpm
f4212287c54e2c9c50198a7ee2f8aa4b
wireshark-gnome-0.99.3-EL4.2.ppc.rpm
s390:
55e4e79696c90c70fb7cd703547a34d4
wireshark-0.99.3-EL4.2.s390.rpm
eb6fd04804d9062a197ce9d2596ebc2c
wireshark-debuginfo-0.99.3-EL4.2.s390.rpm
e89ab523de55013c36f4e114766bc119
wireshark-gnome-0.99.3-EL4.2.s390.rpm
s390x:
cf6518e29733f23b2ce4524a6f1e2009
wireshark-0.99.3-EL4.2.s390x.rpm
5f79558278246bac61160409a289ef6f
wireshark-debuginfo-0.99.3-EL4.2.s390x.rpm
9bca8e2c9ab757daae0a4f8087becc4f
wireshark-gnome-0.99.3-EL4.2.s390x.rpm
x86_64:
3e4b6929e5792edac83a7198e688224b
wireshark-0.99.3-EL4.2.x86_64.rpm
58942cec830e5b353517a34f03647072
wireshark-debuginfo-0.99.3-EL4.2.x86_64.rpm
ad531e1067be6edb1ff8e5acc4fb4502
wireshark-gnome-0.99.3-EL4.2.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/wireshark-0.99.3-EL4.2.src.rpm
26d719c5c61765eb774d08909617332a
wireshark-0.99.3-EL4.2.src.rpm
i386:
020a4db6438210df6463c3081f614068
wireshark-0.99.3-EL4.2.i386.rpm
83bed0df7d4d7ab66e7f714d0ad6e12e
wireshark-debuginfo-0.99.3-EL4.2.i386.rpm
2c3c5a956f42bd63eb6b7d788f70dd09
wireshark-gnome-0.99.3-EL4.2.i386.rpm
x86_64:
3e4b6929e5792edac83a7198e688224b
wireshark-0.99.3-EL4.2.x86_64.rpm
58942cec830e5b353517a34f03647072
wireshark-debuginfo-0.99.3-EL4.2.x86_64.rpm
ad531e1067be6edb1ff8e5acc4fb4502
wireshark-gnome-0.99.3-EL4.2.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/wireshark-0.99.3-EL4.2.src.rpm
26d719c5c61765eb774d08909617332a
wireshark-0.99.3-EL4.2.src.rpm
i386:
020a4db6438210df6463c3081f614068
wireshark-0.99.3-EL4.2.i386.rpm
83bed0df7d4d7ab66e7f714d0ad6e12e
wireshark-debuginfo-0.99.3-EL4.2.i386.rpm
2c3c5a956f42bd63eb6b7d788f70dd09
wireshark-gnome-0.99.3-EL4.2.i386.rpm
ia64:
87253ea0cbbaaaaab7ac5edfe8fcfd65
wireshark-0.99.3-EL4.2.ia64.rpm
79e4e54f464a9136fdcf9d1bdef1032e
wireshark-debuginfo-0.99.3-EL4.2.ia64.rpm
ddef33d5d9efa57e04efa8ff2c32792a
wireshark-gnome-0.99.3-EL4.2.ia64.rpm
x86_64:
3e4b6929e5792edac83a7198e688224b
wireshark-0.99.3-EL4.2.x86_64.rpm
58942cec830e5b353517a34f03647072
wireshark-debuginfo-0.99.3-EL4.2.x86_64.rpm
ad531e1067be6edb1ff8e5acc4fb4502
wireshark-gnome-0.99.3-EL4.2.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/wireshark-0.99.3-EL4.2.src.rpm
26d719c5c61765eb774d08909617332a
wireshark-0.99.3-EL4.2.src.rpm
i386:
020a4db6438210df6463c3081f614068
wireshark-0.99.3-EL4.2.i386.rpm
83bed0df7d4d7ab66e7f714d0ad6e12e
wireshark-debuginfo-0.99.3-EL4.2.i386.rpm
2c3c5a956f42bd63eb6b7d788f70dd09
wireshark-gnome-0.99.3-EL4.2.i386.rpm
ia64:
87253ea0cbbaaaaab7ac5edfe8fcfd65
wireshark-0.99.3-EL4.2.ia64.rpm
79e4e54f464a9136fdcf9d1bdef1032e
wireshark-debuginfo-0.99.3-EL4.2.ia64.rpm
ddef33d5d9efa57e04efa8ff2c32792a
wireshark-gnome-0.99.3-EL4.2.ia64.rpm
x86_64:
3e4b6929e5792edac83a7198e688224b
wireshark-0.99.3-EL4.2.x86_64.rpm
58942cec830e5b353517a34f03647072
wireshark-debuginfo-0.99.3-EL4.2.x86_64.rpm
ad531e1067be6edb1ff8e5acc4fb4502
wireshark-gnome-0.99.3-EL4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333
http://www.wireshark.org/security/wnpa-sec-2006-02.html
http://www.wireshark.org/faq.html#q1.2
http://www.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc.
Red Hat Security Advisory
Synopsis: Low: ncompress security update
Advisory ID: RHSA-2006:0663-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0663.html
Issue date: 2006-09-12
Updated on: 2006-09-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-1168
1. Summary:
Updated ncompress packages that address a security issue and fix
bugs are now available.
This update has been rated as having low security impact by the
Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 –
i386, ia64
Red Hat Linux Advanced Workstation 2.1 – ia64
Red Hat Enterprise Linux ES version 2.1 – i386
Red Hat Enterprise Linux WS version 2.1 – i386
Red Hat Enterprise Linux AS version 3 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Desktop version 3 – i386, x86_64
Red Hat Enterprise Linux ES version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 – i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
The ncompress package contains file compression and
decompression utilities, which are compatible with the original
UNIX compress utility (.Z file extensions).
Tavis Ormandy of the Google Security Team discovered a lack of
bounds checking in ncompress. An attacker could create a carefully
crafted file that could execute arbitrary code if uncompressed by a
victim. (CVE-2006-1168)
In addition, two bugs that affected Red Hat Enterprise Linux 4
ncompress packages were fixed:
- The display statistics and compression results in verbose mode
were not shown when operating on zero length files. - An attempt to compress zero length files resulted in an
unexpected return code.
Users of ncompress are advised to upgrade to these updated
packages, which contain backported patches to correct these
issues.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
189215 – ncompress does not display statistics when compressing
0 length files
189216 – Bad return code when compressing 0 length files
201335 – CVE-2006-1168 Possibility to underflow a .bss buffer with
attacker controlled data
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/ncompress-4.2.4-38.rhel2.src.rpm
eb6007ec73c99cfae684316e03a60b06
ncompress-4.2.4-38.rhel2.src.rpm
i386:
0c44556d4004264fc56dfc4d7881990e
ncompress-4.2.4-38.rhel2.i386.rpm
ia64:
ad1f16ed8f253b3d952a06e97bb4cb24
ncompress-4.2.4-38.rhel2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/ncompress-4.2.4-38.rhel2.src.rpm
eb6007ec73c99cfae684316e03a60b06
ncompress-4.2.4-38.rhel2.src.rpm
ia64:
ad1f16ed8f253b3d952a06e97bb4cb24
ncompress-4.2.4-38.rhel2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/ncompress-4.2.4-38.rhel2.src.rpm
eb6007ec73c99cfae684316e03a60b06
ncompress-4.2.4-38.rhel2.src.rpm
i386:
0c44556d4004264fc56dfc4d7881990e
ncompress-4.2.4-38.rhel2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/ncompress-4.2.4-38.rhel2.src.rpm
eb6007ec73c99cfae684316e03a60b06
ncompress-4.2.4-38.rhel2.src.rpm
i386:
0c44556d4004264fc56dfc4d7881990e
ncompress-4.2.4-38.rhel2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/ncompress-4.2.4-39.rhel3.src.rpm
5470ff0372b3eb8fa6da847646f0a3dc
ncompress-4.2.4-39.rhel3.src.rpm
i386:
bfd9c50245674413a25f6acd53bef47b
ncompress-4.2.4-39.rhel3.i386.rpm
00c0c000396c42c052e0378ce219292b
ncompress-debuginfo-4.2.4-39.rhel3.i386.rpm
ia64:
6e32698aab73a2cfa37198d52dbd8279
ncompress-4.2.4-39.rhel3.ia64.rpm
19b12f415a0c3a07520b753b56bccf64
ncompress-debuginfo-4.2.4-39.rhel3.ia64.rpm
ppc:
16e51ba793dfaaa9c125ef97030c8202
ncompress-4.2.4-39.rhel3.ppc.rpm
3305aa2ccaafa6b2b839a6f14a083907
ncompress-debuginfo-4.2.4-39.rhel3.ppc.rpm
s390:
694a79848689bf49165ffa70dbd48bfa
ncompress-4.2.4-39.rhel3.s390.rpm
a304fa968d23454da477ee87aac33b70
ncompress-debuginfo-4.2.4-39.rhel3.s390.rpm
s390x:
7882f3e72361f310507d991cb19a2b25
ncompress-4.2.4-39.rhel3.s390x.rpm
f38fff0242d9316bb9f5b0ad091aedb4
ncompress-debuginfo-4.2.4-39.rhel3.s390x.rpm
x86_64:
767f6aea14635db8913d2778e57627c1
ncompress-4.2.4-39.rhel3.x86_64.rpm
da1af0e9c76e10c3d82544ff6d71069f
ncompress-debuginfo-4.2.4-39.rhel3.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/ncompress-4.2.4-39.rhel3.src.rpm
5470ff0372b3eb8fa6da847646f0a3dc
ncompress-4.2.4-39.rhel3.src.rpm
i386:
bfd9c50245674413a25f6acd53bef47b
ncompress-4.2.4-39.rhel3.i386.rpm
00c0c000396c42c052e0378ce219292b
ncompress-debuginfo-4.2.4-39.rhel3.i386.rpm
x86_64:
767f6aea14635db8913d2778e57627c1
ncompress-4.2.4-39.rhel3.x86_64.rpm
da1af0e9c76e10c3d82544ff6d71069f
ncompress-debuginfo-4.2.4-39.rhel3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/ncompress-4.2.4-39.rhel3.src.rpm
5470ff0372b3eb8fa6da847646f0a3dc
ncompress-4.2.4-39.rhel3.src.rpm
i386:
bfd9c50245674413a25f6acd53bef47b
ncompress-4.2.4-39.rhel3.i386.rpm
00c0c000396c42c052e0378ce219292b
ncompress-debuginfo-4.2.4-39.rhel3.i386.rpm
ia64:
6e32698aab73a2cfa37198d52dbd8279
ncompress-4.2.4-39.rhel3.ia64.rpm
19b12f415a0c3a07520b753b56bccf64
ncompress-debuginfo-4.2.4-39.rhel3.ia64.rpm
x86_64:
767f6aea14635db8913d2778e57627c1
ncompress-4.2.4-39.rhel3.x86_64.rpm
da1af0e9c76e10c3d82544ff6d71069f
ncompress-debuginfo-4.2.4-39.rhel3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/ncompress-4.2.4-39.rhel3.src.rpm
5470ff0372b3eb8fa6da847646f0a3dc
ncompress-4.2.4-39.rhel3.src.rpm
i386:
bfd9c50245674413a25f6acd53bef47b
ncompress-4.2.4-39.rhel3.i386.rpm
00c0c000396c42c052e0378ce219292b
ncompress-debuginfo-4.2.4-39.rhel3.i386.rpm
ia64:
6e32698aab73a2cfa37198d52dbd8279
ncompress-4.2.4-39.rhel3.ia64.rpm
19b12f415a0c3a07520b753b56bccf64
ncompress-debuginfo-4.2.4-39.rhel3.ia64.rpm
x86_64:
767f6aea14635db8913d2778e57627c1
ncompress-4.2.4-39.rhel3.x86_64.rpm
da1af0e9c76e10c3d82544ff6d71069f
ncompress-debuginfo-4.2.4-39.rhel3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ncompress-4.2.4-43.rhel4.src.rpm
a99ca43a68463aded1fa28d0184288ae
ncompress-4.2.4-43.rhel4.src.rpm
i386:
93e2cece010a5f63060d895bfbc50349
ncompress-4.2.4-43.rhel4.i386.rpm
5d7637bf393d30cfef3b4262d19ec3aa
ncompress-debuginfo-4.2.4-43.rhel4.i386.rpm
ia64:
35239dd95950b6622ace488bcbe9e50b
ncompress-4.2.4-43.rhel4.ia64.rpm
0be7f133a43ce77859cf86635135a86e
ncompress-debuginfo-4.2.4-43.rhel4.ia64.rpm
ppc:
e41b5bacce5d1a5115d3013b32d2f25b
ncompress-4.2.4-43.rhel4.ppc.rpm
9134e58e31b06abf6bde5fadeb1c03e7
ncompress-debuginfo-4.2.4-43.rhel4.ppc.rpm
s390:
37d7fffa2e8a8e24421b2e26e4f3843c
ncompress-4.2.4-43.rhel4.s390.rpm
dfce5613e4d2d3edcae690a1cf4155e3
ncompress-debuginfo-4.2.4-43.rhel4.s390.rpm
s390x:
9f0f16b32fd0bdd5c4cea2bcfc3ad85e
ncompress-4.2.4-43.rhel4.s390x.rpm
54331af9e2989a8fa82410c3dea3e66c
ncompress-debuginfo-4.2.4-43.rhel4.s390x.rpm
x86_64:
b997549a109c544417f861c509ce2466
ncompress-4.2.4-43.rhel4.x86_64.rpm
e35693ccd5bd2b496068670ef8735702
ncompress-debuginfo-4.2.4-43.rhel4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/ncompress-4.2.4-43.rhel4.src.rpm
a99ca43a68463aded1fa28d0184288ae
ncompress-4.2.4-43.rhel4.src.rpm
i386:
93e2cece010a5f63060d895bfbc50349
ncompress-4.2.4-43.rhel4.i386.rpm
5d7637bf393d30cfef3b4262d19ec3aa
ncompress-debuginfo-4.2.4-43.rhel4.i386.rpm
x86_64:
b997549a109c544417f861c509ce2466
ncompress-4.2.4-43.rhel4.x86_64.rpm
e35693ccd5bd2b496068670ef8735702
ncompress-debuginfo-4.2.4-43.rhel4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ncompress-4.2.4-43.rhel4.src.rpm
a99ca43a68463aded1fa28d0184288ae
ncompress-4.2.4-43.rhel4.src.rpm
i386:
93e2cece010a5f63060d895bfbc50349
ncompress-4.2.4-43.rhel4.i386.rpm
5d7637bf393d30cfef3b4262d19ec3aa
ncompress-debuginfo-4.2.4-43.rhel4.i386.rpm
ia64:
35239dd95950b6622ace488bcbe9e50b
ncompress-4.2.4-43.rhel4.ia64.rpm
0be7f133a43ce77859cf86635135a86e
ncompress-debuginfo-4.2.4-43.rhel4.ia64.rpm
x86_64:
b997549a109c544417f861c509ce2466
ncompress-4.2.4-43.rhel4.x86_64.rpm
e35693ccd5bd2b496068670ef8735702
ncompress-debuginfo-4.2.4-43.rhel4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ncompress-4.2.4-43.rhel4.src.rpm
a99ca43a68463aded1fa28d0184288ae
ncompress-4.2.4-43.rhel4.src.rpm
i386:
93e2cece010a5f63060d895bfbc50349
ncompress-4.2.4-43.rhel4.i386.rpm
5d7637bf393d30cfef3b4262d19ec3aa
ncompress-debuginfo-4.2.4-43.rhel4.i386.rpm
ia64:
35239dd95950b6622ace488bcbe9e50b
ncompress-4.2.4-43.rhel4.ia64.rpm
0be7f133a43ce77859cf86635135a86e
ncompress-debuginfo-4.2.4-43.rhel4.ia64.rpm
x86_64:
b997549a109c544417f861c509ce2466
ncompress-4.2.4-43.rhel4.x86_64.rpm
e35693ccd5bd2b496068670ef8735702
ncompress-debuginfo-4.2.4-43.rhel4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key
and details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168
http://www.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More
contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc.
Red Hat Security Advisory
Synopsis: Important: xorg-x11 security update
Advisory ID: RHSA-2006:0665-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0665.html
Issue date: 2006-09-12
Updated on: 2006-09-12
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-3739 CVE-2006-3740
1. Summary:
Updated X.org packages that fix a security issue are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact
by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64
3. Problem description:
X.org is an open source implementation of the X Window System.
It provides the basic low-level functionality that full-fledged
graphical user interfaces are designed upon.
iDefense reported two integer overflow flaws in the way the
X.org server processed CID font files. A malicious authorized
client could exploit this issue to cause a denial of service
(crash) or potentially execute arbitrary code with root privileges
on the X.org server. (CVE-2006-3739, CVE-2006-3740)
Users of X.org should upgrade to these updated packages, which
contain a backported patch and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:
up2date
This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
204548 – CVE-2006-3739 X CID font parser multiple integer
overflows (CVE-2006-3740)
6. RPMs required:
Red Hat Enterprise Linux AS version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.2.src.rpm
517b2d380fd336152b202c59324408ef
xorg-x11-6.8.2-1.EL.13.37.2.src.rpm
i386:
a368efced0eed43b7d1c3be77fe7b162
xorg-x11-6.8.2-1.EL.13.37.2.i386.rpm
c65dd6a8ab16318d3859280d6142cad9
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.i386.rpm
e8670917eaeb9b9fea4983459fd3c2ae
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.i386.rpm
807d497fef90a17e5e729f2ec8384251
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.i386.rpm
a6a383b8393c3c471984a921b7221d6d
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.i386.rpm
be9af36bc49d4949b8a8ba45443e0268
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.i386.rpm
d1ec3b7f27f9e0d02e5c76de09aec5a8
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.i386.rpm
91897e58739908d349c0f13d6dfe5c69
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.i386.rpm
16637fe5cda3394e9dbca923a9098a10
xorg-x11-devel-6.8.2-1.EL.13.37.2.i386.rpm
d86776f3db1511a10feef31b8c034435
xorg-x11-doc-6.8.2-1.EL.13.37.2.i386.rpm
f49f26fdd9f3f9ae499a27b1adeb16f8
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.i386.rpm
1af769ebe6fd490cc3355fd5778c2543
xorg-x11-libs-6.8.2-1.EL.13.37.2.i386.rpm
a33cfdf33e940db78c6a73eede688de6
xorg-x11-sdk-6.8.2-1.EL.13.37.2.i386.rpm
d91cad12e4217828bced689036702aa0
xorg-x11-tools-6.8.2-1.EL.13.37.2.i386.rpm
75f1426e31838e176c9d2db3dc4d0c31
xorg-x11-twm-6.8.2-1.EL.13.37.2.i386.rpm
d7c62c11f3b67a222a8c51e8190ee673
xorg-x11-xauth-6.8.2-1.EL.13.37.2.i386.rpm
b195655d97e695c0475e1a4650d58631
xorg-x11-xdm-6.8.2-1.EL.13.37.2.i386.rpm
0cee7213c2dbfae0aa133ba6df8da50c
xorg-x11-xfs-6.8.2-1.EL.13.37.2.i386.rpm
ia64:
889c5b783df0e205ccd306353b55fb46
xorg-x11-6.8.2-1.EL.13.37.2.ia64.rpm
c65dd6a8ab16318d3859280d6142cad9
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.i386.rpm
59070e6d463f81c1a8e64f8c79896299
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.ia64.rpm
e8670917eaeb9b9fea4983459fd3c2ae
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.i386.rpm
ed535f91e96ee90910bcd168ada83b29
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.ia64.rpm
e86fb73715caed7b5501c7ea398b494d
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.ia64.rpm
14098b27a78d1d5dd2bdccaeb9925e77
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.ia64.rpm
55d1a77bea31fbd63d54af291dfc1c91
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.ia64.rpm
d1ec3b7f27f9e0d02e5c76de09aec5a8
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.i386.rpm
7e409f60af07c3f3dbb3d4798db9e55b
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.ia64.rpm
78dcb6d985ec71afeec63cc31eeaa092
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.ia64.rpm
b48ec2acfb6ef23010b656f42d75d9f3
xorg-x11-devel-6.8.2-1.EL.13.37.2.ia64.rpm
e85e2286d4ba44fec6564e8837eee418
xorg-x11-doc-6.8.2-1.EL.13.37.2.ia64.rpm
fc47657438a95921b6df86f4a6a563cb
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.ia64.rpm
1af769ebe6fd490cc3355fd5778c2543
xorg-x11-libs-6.8.2-1.EL.13.37.2.i386.rpm
d76a22393604def942f306ed88114251
xorg-x11-libs-6.8.2-1.EL.13.37.2.ia64.rpm
4cd112f58409fda9578a41f86de190cb
xorg-x11-sdk-6.8.2-1.EL.13.37.2.ia64.rpm
b56c8679c7041f10022a66f6314567cc
xorg-x11-tools-6.8.2-1.EL.13.37.2.ia64.rpm
3788054cfbe01d0353e844388d2113f7
xorg-x11-twm-6.8.2-1.EL.13.37.2.ia64.rpm
7c801b45811fadd788a5c7105a612a1b
xorg-x11-xauth-6.8.2-1.EL.13.37.2.ia64.rpm
994820a465e00caa519da1aed7407206
xorg-x11-xdm-6.8.2-1.EL.13.37.2.ia64.rpm
a5471bfa4d1b35efed1061f2b106e45f
xorg-x11-xfs-6.8.2-1.EL.13.37.2.ia64.rpm
ppc:
f6aa91af14744a1dd47473eb8bd89a01
xorg-x11-6.8.2-1.EL.13.37.2.ppc.rpm
bc304fa30803e9027eec7b1068af1213
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.ppc.rpm
2f0bc7e5ec4133add55453339f243011
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.ppc64.rpm
160234596ee714e061674eedbbaee371
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.ppc.rpm
748f8daa4bcb5fe93a3bc4438cdf661d
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.ppc64.rpm
f8aba664afb664ae387181b205604db4
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.ppc.rpm
607362a3ce6e915ce81761ab2874e898
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.ppc.rpm
ba81097e73b344cf614a9daa7b0ea510
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.ppc.rpm
913715933f4126d01b5d764d4b46f337
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.ppc.rpm
6c535888a440804dbdee6b771e0a6abd
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.ppc64.rpm
b8bb51979a422cb9e4902383794fed16
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.ppc.rpm
a6642baf48d88e298529b8d8f0e6c48e
xorg-x11-devel-6.8.2-1.EL.13.37.2.ppc.rpm
faaa976aa3ac9283b0314853d26dc763
xorg-x11-devel-6.8.2-1.EL.13.37.2.ppc64.rpm
95e862562c35f42205201d338e9bf177
xorg-x11-doc-6.8.2-1.EL.13.37.2.ppc.rpm
f29812e3d596ec9706f9ec6364faaf92
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.ppc.rpm
88118c8d6ed98a84e9dbd68cec755bff
xorg-x11-libs-6.8.2-1.EL.13.37.2.ppc.rpm
9d8ca2ee7bb098adbdc6c16669fc0276
xorg-x11-libs-6.8.2-1.EL.13.37.2.ppc64.rpm
39dd2a23259a623b01e32bdc685dfc47
xorg-x11-sdk-6.8.2-1.EL.13.37.2.ppc.rpm
4539d8ab0caf8cc0d7c4b1f6c290f2c5
xorg-x11-tools-6.8.2-1.EL.13.37.2.ppc.rpm
dc79aef7668907abe7e7264913700c80
xorg-x11-twm-6.8.2-1.EL.13.37.2.ppc.rpm
33c3e7f2d26f0853c0968514328c03bc
xorg-x11-xauth-6.8.2-1.EL.13.37.2.ppc.rpm
cf94bc33f6c125f26084897b113e2fec
xorg-x11-xdm-6.8.2-1.EL.13.37.2.ppc.rpm
44456b080e6a480fb88ce53a2ccf8027
xorg-x11-xfs-6.8.2-1.EL.13.37.2.ppc.rpm
s390:
a2a49090bb9f0a142610d38f77a42166
xorg-x11-6.8.2-1.EL.13.37.2.s390.rpm
d1da118350a7b20bbbf93df523e47ce3
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.s390.rpm
47d4f8bf9380fca453a0d136544bb3f7
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.s390.rpm
00444882c779fa09a53104d6e60fa166
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.s390.rpm
b1ac267fc3ddc1cc30b958d181342480
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.s390.rpm
691519fe85b8efa432479ce1134127af
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.s390.rpm
ed87f483db7c5fc08231b79da29f9f96
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.s390.rpm
24af33665101cbcd30ebdf77e9954a3f
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.s390.rpm
a0bb760a922794edb4e92df27b63159d
xorg-x11-devel-6.8.2-1.EL.13.37.2.s390.rpm
1f43de997d0d9040a3feb9bc970291da
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.s390.rpm
ee2eae26aad9353a85cbc425024f7f34
xorg-x11-libs-6.8.2-1.EL.13.37.2.s390.rpm
7fcb9d6e9526e1efb6145693f74d2ce7
xorg-x11-tools-6.8.2-1.EL.13.37.2.s390.rpm
b0912d043ceab8189c6453586c2677fe
xorg-x11-twm-6.8.2-1.EL.13.37.2.s390.rpm
f359e125c3bbe21e809a5dbac03f8f0c
xorg-x11-xauth-6.8.2-1.EL.13.37.2.s390.rpm
d3ceb2078d489d8c63e8186b06640239
xorg-x11-xdm-6.8.2-1.EL.13.37.2.s390.rpm
248d637cacefeffaf71660e0562426de
xorg-x11-xfs-6.8.2-1.EL.13.37.2.s390.rpm
s390x:
f683a61a79264eeaada9574632ef8758
xorg-x11-6.8.2-1.EL.13.37.2.s390x.rpm
d1da118350a7b20bbbf93df523e47ce3
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.s390.rpm
226c65696f3192e6622b5a632b329f2c
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.s390x.rpm
47d4f8bf9380fca453a0d136544bb3f7
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.s390.rpm
7d82ae7ab86dd2d642acae01718c4c4c
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.s390x.rpm
7036b5fc10eea026389030f778f44bd7
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.s390x.rpm
6f198c4d3e78ec2d0e562589e4005dc5
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.s390x.rpm
3e5587aac153041baee4b702477afc17
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.s390x.rpm
ed87f483db7c5fc08231b79da29f9f96
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.s390.rpm
bd57370279e51aec84912c1aeea6b2fb
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.s390x.rpm
72bb1750fd321f5c75e5e038b4dbf705
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.s390x.rpm
a0bb760a922794edb4e92df27b63159d
xorg-x11-devel-6.8.2-1.EL.13.37.2.s390.rpm
af2624cb599d372131d00b76f9f8192d
xorg-x11-devel-6.8.2-1.EL.13.37.2.s390x.rpm
d6489b7b3c4a9481075b5d27ceb9de48
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.s390x.rpm
ee2eae26aad9353a85cbc425024f7f34
xorg-x11-libs-6.8.2-1.EL.13.37.2.s390.rpm
a09866a5c0cbc7e2e6693432d0bdaa8e
xorg-x11-libs-6.8.2-1.EL.13.37.2.s390x.rpm
4f093c81555b0a0c387c47fc2c3ff59c
xorg-x11-tools-6.8.2-1.EL.13.37.2.s390x.rpm
a06f2f0f2caf09b2148681bf0b167bf4
xorg-x11-twm-6.8.2-1.EL.13.37.2.s390x.rpm
2d81f250f472e5ec820bf1c44a94a251
xorg-x11-xauth-6.8.2-1.EL.13.37.2.s390x.rpm
9ae44e3c9c40389abb9d8e53e665424b
xorg-x11-xdm-6.8.2-1.EL.13.37.2.s390x.rpm
d4b3ff30a406b0a1ae3821a47392b0a7
xorg-x11-xfs-6.8.2-1.EL.13.37.2.s390x.rpm
x86_64:
d920ff92eecc1b056297a753a146d226
xorg-x11-6.8.2-1.EL.13.37.2.x86_64.rpm
c65dd6a8ab16318d3859280d6142cad9
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.i386.rpm
6c5818b1e580d37c442b63c6648d6670
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.x86_64.rpm
e8670917eaeb9b9fea4983459fd3c2ae
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.i386.rpm
3ea9e3da73fddf0651aaf641ca121348
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.x86_64.rpm
cc4b6ec23dbb68ff1b80b1c66b0ab455
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.x86_64.rpm
929280054f60ef14cf0ab8d4826206b4
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.x86_64.rpm
ebdc0f2e23ba2f98f3bb2267da6c5513
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.x86_64.rpm
d1ec3b7f27f9e0d02e5c76de09aec5a8
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.i386.rpm
61e39278adcf0976bdb3145e6cd9090a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.x86_64.rpm
fd3b49639648b7f7c41bf0fe49c6637f
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.x86_64.rpm
16637fe5cda3394e9dbca923a9098a10
xorg-x11-devel-6.8.2-1.EL.13.37.2.i386.rpm
fc211dcd19f3d6e1934656e8069b1d6a
xorg-x11-devel-6.8.2-1.EL.13.37.2.x86_64.rpm
cda24ff4656b406d640f8b2f97ee4210
xorg-x11-doc-6.8.2-1.EL.13.37.2.x86_64.rpm
b3e57ef755923656bb554ad689820ccb
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.x86_64.rpm
1af769ebe6fd490cc3355fd5778c2543
xorg-x11-libs-6.8.2-1.EL.13.37.2.i386.rpm
74855d2dc48cb75fbcb7eb33cf993e51
xorg-x11-libs-6.8.2-1.EL.13.37.2.x86_64.rpm
65a0ff5b4fde9f656da583c576ab6518
xorg-x11-sdk-6.8.2-1.EL.13.37.2.x86_64.rpm
7c67a392bdb24f33aa8838f91906172a
xorg-x11-tools-6.8.2-1.EL.13.37.2.x86_64.rpm
72342a774fc0d7839129b9d31c9a561b
xorg-x11-twm-6.8.2-1.EL.13.37.2.x86_64.rpm
a749c2a79df1b4b17d260257b4fa913b
xorg-x11-xauth-6.8.2-1.EL.13.37.2.x86_64.rpm
9a2182a3b5d593bb52c3f5457251393b
xorg-x11-xdm-6.8.2-1.EL.13.37.2.x86_64.rpm
e741361bec4d759841e9b2954c9be8e3
xorg-x11-xfs-6.8.2-1.EL.13.37.2.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.2.src.rpm
517b2d380fd336152b202c59324408ef
xorg-x11-6.8.2-1.EL.13.37.2.src.rpm
i386:
a368efced0eed43b7d1c3be77fe7b162
xorg-x11-6.8.2-1.EL.13.37.2.i386.rpm
c65dd6a8ab16318d3859280d6142cad9
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.i386.rpm
e8670917eaeb9b9fea4983459fd3c2ae
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.2.i386.rpm
807d497fef90a17e5e729f2ec8384251
xorg-x11-Xdmx-6.8.2-1.EL.13.37.2.i386.rpm
a6a383b8393c3c471984a921b7221d6d
xorg-x11-Xnest-6.8.2-1.EL.13.37.2.i386.rpm
be9af36bc49d4949b8a8ba45443e0268
xorg-x11-Xvfb-6.8.2-1.EL.13.37.2.i386.rpm
d1ec3b7f27f9e0d02e5c76de09aec5a8
xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.2.i386.rpm
91897e58739908d349c0f13d6dfe5c69
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.2.i386.rpm
16637fe5cda3394e9dbca923a9098a10
xorg-x11-devel-6.8.2-1.EL.13.37.2.i386.rpm
d86776f3db1511a10feef31b8c034435
xorg-x11-doc-6.8.2-1.EL.13.37.2.i386.rpm
f49f26fdd9f3f9ae499a27b1adeb16f8
xorg-x11-font-utils-6.8.2-1.EL.13.37.2.i386.rpm
1af769ebe6fd490cc3355fd5778c2543
xorg-x11-libs-6.8.2-1.EL.13.37.2.i386.rpm
a33cfdf33e940db78c6a73eede688de6
xorg-x11-sdk-6.8.2-1.EL.13.37.2.i386.rpm
d91cad12e4217828bced689036702aa0
xorg-x11-tools-6.8.2-1.EL.13.37.2.i386.rpm
75f1426e31838e176c9d2db3dc4d0c31
xorg-x11-twm-6.8.2-1.EL.13.37.2.i386.rpm
d7c62c11f3b67a222a8c51e8190ee673
xorg-x11-xauth-6.8.2-1.EL.13.37.2.i386.rpm
b195655d97e695c0475e1a4650d58631
xorg-x11-xdm-6.8.2-1.EL.13.37.2.i386.rpm
0cee7213c2dbfae0aa133ba6df8da50c
xorg-x11-xfs-6.8.2-1.EL.13.37.2.i386.rpm
x86_64:
d920ff92eecc1b056297a753a146d226
xorg-x11-6.8.2-1.EL.13.37.2.x86_64.rpm
c65dd6a8ab16318d3859280d6142cad9
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.2.i386.rpm