FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Redhat > Enterprise Watch List

 
 
LinkBack Thread Tools
 
Old 11-29-2007, 01:51 PM
 
Default Important: pcre security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: pcre security update
Advisory ID: RHSA-2007:1059-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1059.html
Issue date: 2007-11-29
Updated on: 2007-11-29
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-7225 CVE-2006-7226 CVE-2006-7228
CVE-2006-7230
- ---------------------------------------------------------------------

1. Summary:

Updated pcre packages that resolve several security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

PCRE is a Perl-compatible regular expression library.

Flaws were discovered in the way PCRE handles certain malformed regular
expressions. If an application linked against PCRE, such as Konqueror,
parses a malicious regular expression, it may have been possible to run
arbitrary code as the user running the application.
(CVE-2006-7225, CVE-2006-7226, CVE-2006-7228, CVE-2006-7230)

Users of PCRE are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Red Hat would like to thank Ludwig Nussel for reporting these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

383371 - CVE-2006-7228 pcre integer overflow
384761 - CVE-2006-7225 pcre miscalculation of memory requirements for malformed Posix character class
384781 - CVE-2006-7226 pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference
384801 - CVE-2006-7230 pcre miscalculation of memory requirements if options are changed during pattern compilation

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pcre-6.6-2.el5_1.7.src.rpm
7cc3f071a95e8dabeae35ea9bb35bf44 pcre-6.6-2.el5_1.7.src.rpm

i386:
d201068ae3b6af398aad8e3fedd2875e pcre-6.6-2.el5_1.7.i386.rpm
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm

x86_64:
d201068ae3b6af398aad8e3fedd2875e pcre-6.6-2.el5_1.7.i386.rpm
408ac25d3001d6df1e1a1373b70efe74 pcre-6.6-2.el5_1.7.x86_64.rpm
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm
1f6c032ee4cf2e520dfc2b94af4d8e7c pcre-debuginfo-6.6-2.el5_1.7.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/pcre-6.6-2.el5_1.7.src.rpm
7cc3f071a95e8dabeae35ea9bb35bf44 pcre-6.6-2.el5_1.7.src.rpm

i386:
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm
a28a9ee687328bc25eb01588c8738784 pcre-devel-6.6-2.el5_1.7.i386.rpm

x86_64:
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm
1f6c032ee4cf2e520dfc2b94af4d8e7c pcre-debuginfo-6.6-2.el5_1.7.x86_64.rpm
a28a9ee687328bc25eb01588c8738784 pcre-devel-6.6-2.el5_1.7.i386.rpm
b9f543c695ad7d8141a5c2fd80692981 pcre-devel-6.6-2.el5_1.7.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/pcre-6.6-2.el5_1.7.src.rpm
7cc3f071a95e8dabeae35ea9bb35bf44 pcre-6.6-2.el5_1.7.src.rpm

i386:
d201068ae3b6af398aad8e3fedd2875e pcre-6.6-2.el5_1.7.i386.rpm
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm
a28a9ee687328bc25eb01588c8738784 pcre-devel-6.6-2.el5_1.7.i386.rpm

ia64:
7d60719573aecd2222867ddbe66bbe6c pcre-6.6-2.el5_1.7.ia64.rpm
2a5a73c832ba4f60ecf4dfad7b99c78a pcre-debuginfo-6.6-2.el5_1.7.ia64.rpm
df733a18eee9d49b391b21e048eee94f pcre-devel-6.6-2.el5_1.7.ia64.rpm

ppc:
12d9ca99b5c09e31a4945526dc22e881 pcre-6.6-2.el5_1.7.ppc.rpm
955028fb20133c35e15d4ca6036ba226 pcre-6.6-2.el5_1.7.ppc64.rpm
ac6427735ecb436b105ca5b4643a857a pcre-debuginfo-6.6-2.el5_1.7.ppc.rpm
432b54afab5a5e6f98c21629027a9dbf pcre-debuginfo-6.6-2.el5_1.7.ppc64.rpm
6858d1c5a378e8957e1dba0d2d18850c pcre-devel-6.6-2.el5_1.7.ppc.rpm
72331b7d69a6f8ae26dff73b3529bc71 pcre-devel-6.6-2.el5_1.7.ppc64.rpm

s390x:
4d7d135ce1ad2cb90de046aa30091e13 pcre-6.6-2.el5_1.7.s390.rpm
b0c3c10df3700779b4196686e6724b54 pcre-6.6-2.el5_1.7.s390x.rpm
dd5ad0c3bb9b1205875f69e48ffcdeb2 pcre-debuginfo-6.6-2.el5_1.7.s390.rpm
c53c6d37bc7bc35946c2f4ce049609ba pcre-debuginfo-6.6-2.el5_1.7.s390x.rpm
6e24bad9004f1803d75c7de2de5d5512 pcre-devel-6.6-2.el5_1.7.s390.rpm
8f07ac7aee4d20b28aa8ebe5e0203d55 pcre-devel-6.6-2.el5_1.7.s390x.rpm

x86_64:
d201068ae3b6af398aad8e3fedd2875e pcre-6.6-2.el5_1.7.i386.rpm
408ac25d3001d6df1e1a1373b70efe74 pcre-6.6-2.el5_1.7.x86_64.rpm
a7608c94759540227129fec7616f0586 pcre-debuginfo-6.6-2.el5_1.7.i386.rpm
1f6c032ee4cf2e520dfc2b94af4d8e7c pcre-debuginfo-6.6-2.el5_1.7.x86_64.rpm
a28a9ee687328bc25eb01588c8738784 pcre-devel-6.6-2.el5_1.7.i386.rpm
b9f543c695ad7d8141a5c2fd80692981 pcre-devel-6.6-2.el5_1.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHTtHcXlSAg2UNWIIRArdaAKCzMMCIDpWfzEvLbuDxa7 fhMYPkLgCgrwTF
d9ISpt+wKee/JJU+lFUzrL4=
=nqPS
-----END PGP SIGNATURE-----



--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 11-29-2007, 01:57 PM
 
Default Important: pcre security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: pcre security update
Advisory ID: RHSA-2007:1063-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1063.html
Issue date: 2007-11-29
Updated on: 2007-11-29
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-7228 CVE-2007-1660
- ---------------------------------------------------------------------

1. Summary:

Updated pcre packages that resolve several security issues are now
available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

PCRE is a Perl-compatible regular expression library.

Flaws were discovered in the way PCRE handles certain malformed regular
expressions. If an application linked against PCRE, such as Konqueror,
parsed a malicious regular expression, it may have been possible to run
arbitrary code as the user running the application. (CVE-2006-7228,
CVE-2007-1660)

Users of PCRE are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Red Hat would like to thank Ludwig Nussel for reporting these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

315881 - CVE-2007-1660 pcre regular expression flaws
383371 - CVE-2006-7228 pcre integer overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

ppc:
adf37fe2c059c2cfe6a0f4f844603e29 pcre-3.9-10.4.ppc.rpm
4c1c16803cb4ae09a5242d059d51658b pcre-3.9-10.4.ppc64.rpm
81c5a80144897a28c1d28a3a590c3f88 pcre-debuginfo-3.9-10.4.ppc.rpm
605e239ef723907e2d4bdb359886d809 pcre-debuginfo-3.9-10.4.ppc64.rpm
faa3350c0417e79165768dafa44fd495 pcre-devel-3.9-10.4.ppc.rpm

s390:
432d71cf2022271a823ead5d9549504f pcre-3.9-10.4.s390.rpm
2939c20c7b5fa5cb63bb8d12fa23f3bc pcre-debuginfo-3.9-10.4.s390.rpm
ebf139993b5ee8f90d1668acf229d202 pcre-devel-3.9-10.4.s390.rpm

s390x:
432d71cf2022271a823ead5d9549504f pcre-3.9-10.4.s390.rpm
3a808e46628e79d79c7e808aacc44c15 pcre-3.9-10.4.s390x.rpm
2939c20c7b5fa5cb63bb8d12fa23f3bc pcre-debuginfo-3.9-10.4.s390.rpm
91e8e1fa0791367d99d051eecc0b9179 pcre-debuginfo-3.9-10.4.s390x.rpm
24b9c346b9c686fe3cf12768673bab18 pcre-devel-3.9-10.4.s390x.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/pcre-3.9-10.4.src.rpm
44ea64b64fa610c91ae055878e4e8085 pcre-3.9-10.4.src.rpm

i386:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
e9ea2e70165ac3d7e95249ccd16a9983 pcre-devel-3.9-10.4.i386.rpm

ia64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
fd7349f54aceb88dcd86b267f812bafc pcre-3.9-10.4.ia64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
f9c1e6ff16151dc24ae22b51ab0c79f2 pcre-debuginfo-3.9-10.4.ia64.rpm
721a7dfcd642f66fcbcc2ac04afdb8bb pcre-devel-3.9-10.4.ia64.rpm

x86_64:
95779554a24650e24d757e764aa74f25 pcre-3.9-10.4.i386.rpm
0d5e674d6622efd83c07fdcd16ba3dc2 pcre-3.9-10.4.x86_64.rpm
56c96fa950f63b46658ecbcedecb4dd1 pcre-debuginfo-3.9-10.4.i386.rpm
dd121878136f47104359f54deb77b0dd pcre-debuginfo-3.9-10.4.x86_64.rpm
b6d06e7efdfd9ed8b35a15b1370808c6 pcre-devel-3.9-10.4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHTtM3XlSAg2UNWIIRAsOWAJ9oMn7V6qFZFrdQQF0c0N G+si3XTQCfUEaW
bR3m4KOaylsgKf1zo8E2umc=
=+hYj
-----END PGP SIGNATURE-----



--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 
Old 11-29-2007, 02:09 PM
 
Default Important: pcre security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: pcre security update
Advisory ID: RHSA-2007:1068-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1068.html
Issue date: 2007-11-29
Updated on: 2007-11-29
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-7225 CVE-2006-7226 CVE-2006-7228
CVE-2006-7230 CVE-2007-1659
- ---------------------------------------------------------------------

1. Summary:

Updated pcre packages that resolve several security issues are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

PCRE is a Perl-compatible regular expression library.

Flaws were discovered in the way PCRE handles certain malformed regular
expressions. If an application linked against PCRE, such as Konqueror,
parses a malicious regular expression, it may have been possible to run
arbitrary code as the user running the application.
(CVE-2006-7225, CVE-2006-7226, CVE-2006-7228, CVE-2006-7230, CVE-2007-1659)

Users of PCRE are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Red Hat would like to thank Ludwig Nussel for reporting these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

315871 - CVE-2007-1659 pcre regular expression flaws
383371 - CVE-2006-7228 pcre integer overflow
384761 - CVE-2006-7225 pcre miscalculation of memory requirements for malformed Posix character class
384781 - CVE-2006-7226 pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference
384801 - CVE-2006-7230 pcre miscalculation of memory requirements if options are changed during pattern compilation

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/pcre-4.5-4.el4_6.6.src.rpm
3fc0fdaf84b06cdf5788640cff0026f6 pcre-4.5-4.el4_6.6.src.rpm

i386:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
9965f80d4d5ab3b571ab3c3cc9898990 pcre-devel-4.5-4.el4_6.6.i386.rpm

ia64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
33f4eab971ef408facd1641eabaa467a pcre-4.5-4.el4_6.6.ia64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
e5a27c2bddd2644641b1ad235508fbda pcre-debuginfo-4.5-4.el4_6.6.ia64.rpm
6dfe274bd09371d8e0de10c5cc92bc26 pcre-devel-4.5-4.el4_6.6.ia64.rpm

ppc:
47acc99aadd1698c477beb54465e13f9 pcre-4.5-4.el4_6.6.ppc.rpm
c7bc58a2b1b45cba707f6e32f6b5182b pcre-4.5-4.el4_6.6.ppc64.rpm
91d3d8000f09f9f3c8da971773718f24 pcre-debuginfo-4.5-4.el4_6.6.ppc.rpm
3efa974cd8f22041f71552ae295fc477 pcre-debuginfo-4.5-4.el4_6.6.ppc64.rpm
ffc58e305b91c427bab0f1d536bf8e3a pcre-devel-4.5-4.el4_6.6.ppc.rpm

s390:
db4e05d53ed8fb12030d2f6684d9d869 pcre-4.5-4.el4_6.6.s390.rpm
4c60f3a6fa76de879ace31d7c635b68f pcre-debuginfo-4.5-4.el4_6.6.s390.rpm
28d5cef76bf6ad728e777cd80e0e6628 pcre-devel-4.5-4.el4_6.6.s390.rpm

s390x:
db4e05d53ed8fb12030d2f6684d9d869 pcre-4.5-4.el4_6.6.s390.rpm
934cdcaa114cd70bf10f089fff41fea1 pcre-4.5-4.el4_6.6.s390x.rpm
4c60f3a6fa76de879ace31d7c635b68f pcre-debuginfo-4.5-4.el4_6.6.s390.rpm
fc3a110b4cd548dc04590636f57c28ea pcre-debuginfo-4.5-4.el4_6.6.s390x.rpm
f8589e25f1c60407ae174a941b3fa51f pcre-devel-4.5-4.el4_6.6.s390x.rpm

x86_64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
5ec42946ee8eea49029ff7b06ee58234 pcre-4.5-4.el4_6.6.x86_64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
d39e0bdc461577451e10a9d855e6fc73 pcre-debuginfo-4.5-4.el4_6.6.x86_64.rpm
d2464456a160a001ee8810a35235b3ae pcre-devel-4.5-4.el4_6.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/pcre-4.5-4.el4_6.6.src.rpm
3fc0fdaf84b06cdf5788640cff0026f6 pcre-4.5-4.el4_6.6.src.rpm

i386:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
9965f80d4d5ab3b571ab3c3cc9898990 pcre-devel-4.5-4.el4_6.6.i386.rpm

x86_64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
5ec42946ee8eea49029ff7b06ee58234 pcre-4.5-4.el4_6.6.x86_64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
d39e0bdc461577451e10a9d855e6fc73 pcre-debuginfo-4.5-4.el4_6.6.x86_64.rpm
d2464456a160a001ee8810a35235b3ae pcre-devel-4.5-4.el4_6.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/pcre-4.5-4.el4_6.6.src.rpm
3fc0fdaf84b06cdf5788640cff0026f6 pcre-4.5-4.el4_6.6.src.rpm

i386:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
9965f80d4d5ab3b571ab3c3cc9898990 pcre-devel-4.5-4.el4_6.6.i386.rpm

ia64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
33f4eab971ef408facd1641eabaa467a pcre-4.5-4.el4_6.6.ia64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
e5a27c2bddd2644641b1ad235508fbda pcre-debuginfo-4.5-4.el4_6.6.ia64.rpm
6dfe274bd09371d8e0de10c5cc92bc26 pcre-devel-4.5-4.el4_6.6.ia64.rpm

x86_64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
5ec42946ee8eea49029ff7b06ee58234 pcre-4.5-4.el4_6.6.x86_64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
d39e0bdc461577451e10a9d855e6fc73 pcre-debuginfo-4.5-4.el4_6.6.x86_64.rpm
d2464456a160a001ee8810a35235b3ae pcre-devel-4.5-4.el4_6.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/pcre-4.5-4.el4_6.6.src.rpm
3fc0fdaf84b06cdf5788640cff0026f6 pcre-4.5-4.el4_6.6.src.rpm

i386:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
9965f80d4d5ab3b571ab3c3cc9898990 pcre-devel-4.5-4.el4_6.6.i386.rpm

ia64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
33f4eab971ef408facd1641eabaa467a pcre-4.5-4.el4_6.6.ia64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
e5a27c2bddd2644641b1ad235508fbda pcre-debuginfo-4.5-4.el4_6.6.ia64.rpm
6dfe274bd09371d8e0de10c5cc92bc26 pcre-devel-4.5-4.el4_6.6.ia64.rpm

x86_64:
2fc7dcfeab667b57d6cd72b3900e23e4 pcre-4.5-4.el4_6.6.i386.rpm
5ec42946ee8eea49029ff7b06ee58234 pcre-4.5-4.el4_6.6.x86_64.rpm
1792b64ed883f57a999ed859b9a9e554 pcre-debuginfo-4.5-4.el4_6.6.i386.rpm
d39e0bdc461577451e10a9d855e6fc73 pcre-debuginfo-4.5-4.el4_6.6.x86_64.rpm
d2464456a160a001ee8810a35235b3ae pcre-devel-4.5-4.el4_6.6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHTtY1XlSAg2UNWIIRAikxAJ9OELYnFxcI0Y1oBXxErF mXwA1qUQCguVY1
7EQaFgPnBgKIqdZL0S7M/Xo=
=JPO8
-----END PGP SIGNATURE-----



--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
 

Thread Tools




All times are GMT. The time now is 09:38 PM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org