[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 424/05 - Three Red Hat Security Advisories:



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 424/05 dated 02.06.05  Time: 14:50  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Three Red Hat Security Advisories:

1. RHSA-2005:430-01 - gnutls security update
       
2. RHSA-2005:433-01 - postgresql security update
       
3. RHSA-2005:476-01 - openssl security update
       
Detail
====== 

1. A denial of service bug was found in the GnuTLS library versions prior to
1.0.25. A remote attacker could perform a carefully crafted TLS handshake
against a service that uses the GnuTLS library causing the service to
crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1431 to this issue.

2. The PostgreSQL community discovered two distinct errors in initial system
catalog entries that could allow authorized database users to crash the
database and possibly escalate their privileges.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CAN-2005-1409 and CAN-2005-1410 to these issues.

3. Colin Percival reported a cache timing attack that could allow a malicious
local user to gain portions of cryptographic keys.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CAN-2005-0109 to the issue.  The OpenSSL library has been patched to add a
new fixed-window mod_exp implementation as default for RSA, DSA, and DH
private-key operations.  This patch is designed to mitigate cache timing
and potentially related attacks.



1.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: gnutls security update
Advisory ID:       RHSA-2005:430-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-430.html
Issue date:        2005-06-01
Updated on:        2005-06-01
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-1431
- - ---------------------------------------------------------------------

1. Summary:

Updated GnuTLS packages that fix a remote denial of service
vulnerability are available for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The GnuTLS library implements Secure Sockets Layer (SSL v3) and Transport
Layer Security (TLS v1) protocols.

A denial of service bug was found in the GnuTLS library versions prior to
1.0.25. A remote attacker could perform a carefully crafted TLS handshake
against a service that uses the GnuTLS library causing the service to
crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-1431 to this issue.

All users of GnuTLS are advised to upgrade to these updated packages and to
restart any services which use GnuTLS.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/):

156856 - CAN-2005-1431 gnutls record packet parsing DoS


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/gnutls-1.0.20-3.2.1.src.rpm
3128f30586e2755833d6be0a5fed5953  gnutls-1.0.20-3.2.1.src.rpm

i386:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
15215cf34c300a14c9062112f1041f13  gnutls-devel-1.0.20-3.2.1.i386.rpm

ia64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
8dfc44e9ab20b616893ab2cdd732336a  gnutls-1.0.20-3.2.1.ia64.rpm
1703e35a63b23cd9b938d62bec4bbc81  gnutls-devel-1.0.20-3.2.1.ia64.rpm

ppc:
bb3a72f82d5820029608b2c0ddc2ec98  gnutls-1.0.20-3.2.1.ppc.rpm
6bbc1e82cf41aff68d4494789e9b351a  gnutls-1.0.20-3.2.1.ppc64.rpm
c74ceaa7aab6619f3a57a7e5a0fdba7e  gnutls-devel-1.0.20-3.2.1.ppc.rpm

s390:
0838499c59e08268c0a75f6e04a6d77a  gnutls-1.0.20-3.2.1.s390.rpm
f0d53c5774ad15ec76376dd285673bee  gnutls-devel-1.0.20-3.2.1.s390.rpm

s390x:
0838499c59e08268c0a75f6e04a6d77a  gnutls-1.0.20-3.2.1.s390.rpm
af047e9df358c24aec98b4a8dea3c8a4  gnutls-1.0.20-3.2.1.s390x.rpm
227c047c8dd212095779bea2a9ffff88  gnutls-devel-1.0.20-3.2.1.s390x.rpm

x86_64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
eb086cf7b322caeec81ee06f4117bff9  gnutls-1.0.20-3.2.1.x86_64.rpm
fe64d1591d7b2ccab10084b96d1bdde5  gnutls-devel-1.0.20-3.2.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/gnutls-1.0.20-3.2.1.src.rpm
3128f30586e2755833d6be0a5fed5953  gnutls-1.0.20-3.2.1.src.rpm

i386:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
15215cf34c300a14c9062112f1041f13  gnutls-devel-1.0.20-3.2.1.i386.rpm

x86_64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
eb086cf7b322caeec81ee06f4117bff9  gnutls-1.0.20-3.2.1.x86_64.rpm
fe64d1591d7b2ccab10084b96d1bdde5  gnutls-devel-1.0.20-3.2.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/gnutls-1.0.20-3.2.1.src.rpm
3128f30586e2755833d6be0a5fed5953  gnutls-1.0.20-3.2.1.src.rpm

i386:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
15215cf34c300a14c9062112f1041f13  gnutls-devel-1.0.20-3.2.1.i386.rpm

ia64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
8dfc44e9ab20b616893ab2cdd732336a  gnutls-1.0.20-3.2.1.ia64.rpm
1703e35a63b23cd9b938d62bec4bbc81  gnutls-devel-1.0.20-3.2.1.ia64.rpm

x86_64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
eb086cf7b322caeec81ee06f4117bff9  gnutls-1.0.20-3.2.1.x86_64.rpm
fe64d1591d7b2ccab10084b96d1bdde5  gnutls-devel-1.0.20-3.2.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/gnutls-1.0.20-3.2.1.src.rpm
3128f30586e2755833d6be0a5fed5953  gnutls-1.0.20-3.2.1.src.rpm

i386:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
15215cf34c300a14c9062112f1041f13  gnutls-devel-1.0.20-3.2.1.i386.rpm

ia64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
8dfc44e9ab20b616893ab2cdd732336a  gnutls-1.0.20-3.2.1.ia64.rpm
1703e35a63b23cd9b938d62bec4bbc81  gnutls-devel-1.0.20-3.2.1.ia64.rpm

x86_64:
3b17c2f6b5af1aae38bfef34231e23fd  gnutls-1.0.20-3.2.1.i386.rpm
eb086cf7b322caeec81ee06f4117bff9  gnutls-1.0.20-3.2.1.x86_64.rpm
fe64d1591d7b2ccab10084b96d1bdde5  gnutls-devel-1.0.20-3.2.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1431

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCnboNXlSAg2UNWIIRAiWDAKCr755KOxq4O8bECTHCxW3hr7gXEgCfTSkr
/sb3ytZgaPpQBQnxOYabo6E=
=CL2L
- -----END PGP SIGNATURE-----


- -- 
Enterprise-watch-list mailing list
Enterprise-watch-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/enterprise-watch-list


2.

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: postgresql security update
Advisory ID:       RHSA-2005:433-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-433.html
Issue date:        2005-06-01
Updated on:        2005-06-01
Product:           Red Hat Enterprise Linux
Obsoletes:         RHBA-2005:209
CVE Names:         CAN-2005-1409 CAN-2005-1410
- - ---------------------------------------------------------------------

1. Summary:

Updated postgresql packages that fix several security vulnerabilities and
risks of data loss are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

PostgreSQL is an advanced Object-Relational database management system
(DBMS) that supports almost all SQL constructs (including
transactions, subselects and user-defined types and functions).

The PostgreSQL community discovered two distinct errors in initial system
catalog entries that could allow authorized database users to crash the
database and possibly escalate their privileges.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
names CAN-2005-1409 and CAN-2005-1410 to these issues.

Although installing this update will protect new (freshly initdb'd)
database installations from these errors, administrators MUST TAKE MANUAL
ACTION to repair the errors in pre-existing databases.  The appropriate
procedures are explained at
http://www.postgresql.org/docs/8.0/static/release-7-4-8.html
for Red Hat Enterprise Linux 4 users, or
http://www.postgresql.org/docs/8.0/static/release-7-3-10.html
for Red Hat Enterprise Linux 3 users.

This update corrects several problems that might occur while trying to
upgrade a Red Hat Enterprise Linux 3 installation (containing rh-postgresql
packages) to Red Hat Enterprise Linux 4 (containing postgresql packages).
These updated packages correctly supersede the rh-postgresql packages.

The original release of Red Hat Enterprise Linux 4 failed to initialize the
database correctly if started for the first time with SELinux in
enforcement mode. This update corrects that problem.  

If you already have a nonfunctional database in place, shut down the
postgresql service if running, install this update, then do "sudo rm -rf
/var/lib/pgsql/data" before restarting the postgresql service.

This update also solves the problem that the PostgreSQL server might fail
to restart after a system reboot, due to a stale lockfile.

This update also corrects a problem with wrong error messages in libpq,
the postgresql client library.  The library would formerly report kernel
error messages incorrectly when the locale setting was not C.

This update also includes fixes for several other errors, including two
race conditions that could result in apparent data inconsistency or actual
data loss.

All users of PostgreSQL are advised to upgrade to these updated packages
and to apply the recommended manual corrections to existing databases.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

149237 - selinux <<EOF bug breaks PostgreSQL too
151421 - PostgreSQL server does not start after crash because wrong PID file location
151911 - upgrade from rhel-3 rh-postgresql to rhel-4 postgresql removes user "postgres"
156726 - CAN-2005-1409 Multiple postgresql issues (CAN-2005-1410)


6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/rh-postgresql-7.3.10-1.src.rpm
6023eb8a8c3ad163fd438d4d03a134b3  rh-postgresql-7.3.10-1.src.rpm

i386:
f15641d73ad46bf099edafb8feff0030  rh-postgresql-7.3.10-1.i386.rpm
eb31eaa60f9fabd48fda368b01277aa0  rh-postgresql-contrib-7.3.10-1.i386.rpm
f5a5dbcedb35e1c7104c9792099f648d  rh-postgresql-devel-7.3.10-1.i386.rpm
464338c3dff8bd6719aede959b9b3587  rh-postgresql-docs-7.3.10-1.i386.rpm
450cec78eabdea78015b69d15f4e5b8e  rh-postgresql-jdbc-7.3.10-1.i386.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
e127dd6f8dd557a3dece04510b3cb886  rh-postgresql-pl-7.3.10-1.i386.rpm
20ef74f92403d4270e0993f4c1e3476e  rh-postgresql-python-7.3.10-1.i386.rpm
90988ac2ef44662c4af61ab2d1bded66  rh-postgresql-server-7.3.10-1.i386.rpm
262cd45feb50dfa6ab7277d562445dfe  rh-postgresql-tcl-7.3.10-1.i386.rpm
437bfa0eb7c527ffe95614d8cdcb9d7d  rh-postgresql-test-7.3.10-1.i386.rpm

ia64:
65f67a78e1e365fa7e833c981b9f8198  rh-postgresql-7.3.10-1.ia64.rpm
a2383dc1b7a6cf2097638264034319a7  rh-postgresql-contrib-7.3.10-1.ia64.rpm
169c05674b5d79fdae4b98167b8cd9be  rh-postgresql-devel-7.3.10-1.ia64.rpm
4cdaee2c5988a1322378f387850c580e  rh-postgresql-docs-7.3.10-1.ia64.rpm
4f273bc9daee6c12d88fd562546561b1  rh-postgresql-jdbc-7.3.10-1.ia64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
21e0b02c3309c23d2b5f4676430817d9  rh-postgresql-libs-7.3.10-1.ia64.rpm
886f9e90347b4443dd990631e25109dd  rh-postgresql-pl-7.3.10-1.ia64.rpm
b6f9531b0dbd402a6c9413b40c3286fb  rh-postgresql-python-7.3.10-1.ia64.rpm
3acc83064f78880934f698a74ee117e8  rh-postgresql-server-7.3.10-1.ia64.rpm
3e60f3aad251079fcb5c9cc270dbf6d0  rh-postgresql-tcl-7.3.10-1.ia64.rpm
400108517c771891083244b56bdc7918  rh-postgresql-test-7.3.10-1.ia64.rpm

ppc:
6db25b2a93bcce119eaac743ee6b0c5d  rh-postgresql-7.3.10-1.ppc.rpm
ebe5ba5236a5712cdde5835e032ec884  rh-postgresql-contrib-7.3.10-1.ppc.rpm
9e00bb93403fa170649d299ce24c848c  rh-postgresql-devel-7.3.10-1.ppc.rpm
40e05f0751f9ad4d3d5b10b69f31bc44  rh-postgresql-docs-7.3.10-1.ppc.rpm
91b87665aa2b5219218dc4d21bc2f8f1  rh-postgresql-jdbc-7.3.10-1.ppc.rpm
15199760c34261b75dc66ff27b2ea6cf  rh-postgresql-libs-7.3.10-1.ppc.rpm
73d20dce785a01febed79f37cee6fcf4  rh-postgresql-libs-7.3.10-1.ppc64.rpm
1d7d0dbfb0ddeb45fde00d9bdab7fac4  rh-postgresql-pl-7.3.10-1.ppc.rpm
41ee6fe1739613d0414c6fc74e059cce  rh-postgresql-python-7.3.10-1.ppc.rpm
0831112f7ca9fe301a8a7ac3f54a8652  rh-postgresql-server-7.3.10-1.ppc.rpm
4d85f0746a2e791eccd3153744f3d1f8  rh-postgresql-tcl-7.3.10-1.ppc.rpm
76b125f0931a24257802dae18d8ffc13  rh-postgresql-test-7.3.10-1.ppc.rpm

s390:
862dfd1cc8a10debf3d5af08ee479cdc  rh-postgresql-7.3.10-1.s390.rpm
92b762ef0694c94e2b023c589bc1a57b  rh-postgresql-contrib-7.3.10-1.s390.rpm
d1802a429d8d0e759f6965f227e933d7  rh-postgresql-devel-7.3.10-1.s390.rpm
2791ec128e728931085f4dd2abb419df  rh-postgresql-docs-7.3.10-1.s390.rpm
b6bf2feeb91d91e98b889fc4f73561b3  rh-postgresql-jdbc-7.3.10-1.s390.rpm
83fb1b87b671cd172508444d24d6072e  rh-postgresql-libs-7.3.10-1.s390.rpm
7668c49ecb3de42ea3e3336d0b4808f3  rh-postgresql-pl-7.3.10-1.s390.rpm
eb292bd772f0331b12c43f7ed3613184  rh-postgresql-python-7.3.10-1.s390.rpm
85714a1d437f6ab4a4e9829971ebc3ac  rh-postgresql-server-7.3.10-1.s390.rpm
06b123bb103a3b582f096bb8ff4bb2b4  rh-postgresql-tcl-7.3.10-1.s390.rpm
1e4b2aab5648fbf83202b056ad63aeed  rh-postgresql-test-7.3.10-1.s390.rpm

s390x:
0dfb51ec4e46b97ed9b2979be76f214d  rh-postgresql-7.3.10-1.s390x.rpm
e3ff31f3121e1345fc5b20854f8c2fc5  rh-postgresql-contrib-7.3.10-1.s390x.rpm
a7e6f8e7b03ca315697d5b74d2f649ba  rh-postgresql-devel-7.3.10-1.s390x.rpm
58851e30b9499e9e2342c40070fb789a  rh-postgresql-docs-7.3.10-1.s390x.rpm
e5b9005a73434efdaea6c013e0d572dd  rh-postgresql-jdbc-7.3.10-1.s390x.rpm
83fb1b87b671cd172508444d24d6072e  rh-postgresql-libs-7.3.10-1.s390.rpm
bff9b3297aea0b9e9b68dc9b15185098  rh-postgresql-libs-7.3.10-1.s390x.rpm
94c9e24a5b06828299db337c9ee9b6a5  rh-postgresql-pl-7.3.10-1.s390x.rpm
7c321dbe7feb3b800ab5774865391e42  rh-postgresql-python-7.3.10-1.s390x.rpm
ee2f697cdd90574b0fbd5ba40d4929a1  rh-postgresql-server-7.3.10-1.s390x.rpm
a26da2856519c3f5e92c10ce739e655a  rh-postgresql-tcl-7.3.10-1.s390x.rpm
08da4dbed43384d6770a94da363b40e0  rh-postgresql-test-7.3.10-1.s390x.rpm

x86_64:
12d545f9a1fb96917314edc7ab7a899c  rh-postgresql-7.3.10-1.x86_64.rpm
8bf74a618da18fb79471ced0addb51a4  rh-postgresql-contrib-7.3.10-1.x86_64.rpm
3521d8ef6a7aec53b16eb2ccf820c19a  rh-postgresql-devel-7.3.10-1.x86_64.rpm
476ea9eeff93069d8b532d2c72f42b30  rh-postgresql-docs-7.3.10-1.x86_64.rpm
f52eabdc6df3510fa95fcbac36890b81  rh-postgresql-jdbc-7.3.10-1.x86_64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
35d2b6cd11417def624b0b26597b06bb  rh-postgresql-libs-7.3.10-1.x86_64.rpm
3660b4e3a4f05178f87424ec85f77ca0  rh-postgresql-pl-7.3.10-1.x86_64.rpm
1b6d555e557142aa1749d570afb5258d  rh-postgresql-python-7.3.10-1.x86_64.rpm
6d259b3e26f91817db6eded98c979bd0  rh-postgresql-server-7.3.10-1.x86_64.rpm
abd82efd41b8875736b3f2f1149aceac  rh-postgresql-tcl-7.3.10-1.x86_64.rpm
3fb702998409f1952b0d4c909738b11d  rh-postgresql-test-7.3.10-1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/rh-postgresql-7.3.10-1.src.rpm
6023eb8a8c3ad163fd438d4d03a134b3  rh-postgresql-7.3.10-1.src.rpm

i386:
f15641d73ad46bf099edafb8feff0030  rh-postgresql-7.3.10-1.i386.rpm
eb31eaa60f9fabd48fda368b01277aa0  rh-postgresql-contrib-7.3.10-1.i386.rpm
f5a5dbcedb35e1c7104c9792099f648d  rh-postgresql-devel-7.3.10-1.i386.rpm
464338c3dff8bd6719aede959b9b3587  rh-postgresql-docs-7.3.10-1.i386.rpm
450cec78eabdea78015b69d15f4e5b8e  rh-postgresql-jdbc-7.3.10-1.i386.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
e127dd6f8dd557a3dece04510b3cb886  rh-postgresql-pl-7.3.10-1.i386.rpm
20ef74f92403d4270e0993f4c1e3476e  rh-postgresql-python-7.3.10-1.i386.rpm
90988ac2ef44662c4af61ab2d1bded66  rh-postgresql-server-7.3.10-1.i386.rpm
262cd45feb50dfa6ab7277d562445dfe  rh-postgresql-tcl-7.3.10-1.i386.rpm
437bfa0eb7c527ffe95614d8cdcb9d7d  rh-postgresql-test-7.3.10-1.i386.rpm

x86_64:
12d545f9a1fb96917314edc7ab7a899c  rh-postgresql-7.3.10-1.x86_64.rpm
8bf74a618da18fb79471ced0addb51a4  rh-postgresql-contrib-7.3.10-1.x86_64.rpm
3521d8ef6a7aec53b16eb2ccf820c19a  rh-postgresql-devel-7.3.10-1.x86_64.rpm
476ea9eeff93069d8b532d2c72f42b30  rh-postgresql-docs-7.3.10-1.x86_64.rpm
f52eabdc6df3510fa95fcbac36890b81  rh-postgresql-jdbc-7.3.10-1.x86_64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
35d2b6cd11417def624b0b26597b06bb  rh-postgresql-libs-7.3.10-1.x86_64.rpm
3660b4e3a4f05178f87424ec85f77ca0  rh-postgresql-pl-7.3.10-1.x86_64.rpm
1b6d555e557142aa1749d570afb5258d  rh-postgresql-python-7.3.10-1.x86_64.rpm
6d259b3e26f91817db6eded98c979bd0  rh-postgresql-server-7.3.10-1.x86_64.rpm
abd82efd41b8875736b3f2f1149aceac  rh-postgresql-tcl-7.3.10-1.x86_64.rpm
3fb702998409f1952b0d4c909738b11d  rh-postgresql-test-7.3.10-1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/rh-postgresql-7.3.10-1.src.rpm
6023eb8a8c3ad163fd438d4d03a134b3  rh-postgresql-7.3.10-1.src.rpm

i386:
f15641d73ad46bf099edafb8feff0030  rh-postgresql-7.3.10-1.i386.rpm
eb31eaa60f9fabd48fda368b01277aa0  rh-postgresql-contrib-7.3.10-1.i386.rpm
f5a5dbcedb35e1c7104c9792099f648d  rh-postgresql-devel-7.3.10-1.i386.rpm
464338c3dff8bd6719aede959b9b3587  rh-postgresql-docs-7.3.10-1.i386.rpm
450cec78eabdea78015b69d15f4e5b8e  rh-postgresql-jdbc-7.3.10-1.i386.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
e127dd6f8dd557a3dece04510b3cb886  rh-postgresql-pl-7.3.10-1.i386.rpm
20ef74f92403d4270e0993f4c1e3476e  rh-postgresql-python-7.3.10-1.i386.rpm
90988ac2ef44662c4af61ab2d1bded66  rh-postgresql-server-7.3.10-1.i386.rpm
262cd45feb50dfa6ab7277d562445dfe  rh-postgresql-tcl-7.3.10-1.i386.rpm
437bfa0eb7c527ffe95614d8cdcb9d7d  rh-postgresql-test-7.3.10-1.i386.rpm

ia64:
65f67a78e1e365fa7e833c981b9f8198  rh-postgresql-7.3.10-1.ia64.rpm
a2383dc1b7a6cf2097638264034319a7  rh-postgresql-contrib-7.3.10-1.ia64.rpm
169c05674b5d79fdae4b98167b8cd9be  rh-postgresql-devel-7.3.10-1.ia64.rpm
4cdaee2c5988a1322378f387850c580e  rh-postgresql-docs-7.3.10-1.ia64.rpm
4f273bc9daee6c12d88fd562546561b1  rh-postgresql-jdbc-7.3.10-1.ia64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
21e0b02c3309c23d2b5f4676430817d9  rh-postgresql-libs-7.3.10-1.ia64.rpm
886f9e90347b4443dd990631e25109dd  rh-postgresql-pl-7.3.10-1.ia64.rpm
b6f9531b0dbd402a6c9413b40c3286fb  rh-postgresql-python-7.3.10-1.ia64.rpm
3acc83064f78880934f698a74ee117e8  rh-postgresql-server-7.3.10-1.ia64.rpm
3e60f3aad251079fcb5c9cc270dbf6d0  rh-postgresql-tcl-7.3.10-1.ia64.rpm
400108517c771891083244b56bdc7918  rh-postgresql-test-7.3.10-1.ia64.rpm

x86_64:
12d545f9a1fb96917314edc7ab7a899c  rh-postgresql-7.3.10-1.x86_64.rpm
8bf74a618da18fb79471ced0addb51a4  rh-postgresql-contrib-7.3.10-1.x86_64.rpm
3521d8ef6a7aec53b16eb2ccf820c19a  rh-postgresql-devel-7.3.10-1.x86_64.rpm
476ea9eeff93069d8b532d2c72f42b30  rh-postgresql-docs-7.3.10-1.x86_64.rpm
f52eabdc6df3510fa95fcbac36890b81  rh-postgresql-jdbc-7.3.10-1.x86_64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
35d2b6cd11417def624b0b26597b06bb  rh-postgresql-libs-7.3.10-1.x86_64.rpm
3660b4e3a4f05178f87424ec85f77ca0  rh-postgresql-pl-7.3.10-1.x86_64.rpm
1b6d555e557142aa1749d570afb5258d  rh-postgresql-python-7.3.10-1.x86_64.rpm
6d259b3e26f91817db6eded98c979bd0  rh-postgresql-server-7.3.10-1.x86_64.rpm
abd82efd41b8875736b3f2f1149aceac  rh-postgresql-tcl-7.3.10-1.x86_64.rpm
3fb702998409f1952b0d4c909738b11d  rh-postgresql-test-7.3.10-1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/rh-postgresql-7.3.10-1.src.rpm
6023eb8a8c3ad163fd438d4d03a134b3  rh-postgresql-7.3.10-1.src.rpm

i386:
f15641d73ad46bf099edafb8feff0030  rh-postgresql-7.3.10-1.i386.rpm
eb31eaa60f9fabd48fda368b01277aa0  rh-postgresql-contrib-7.3.10-1.i386.rpm
f5a5dbcedb35e1c7104c9792099f648d  rh-postgresql-devel-7.3.10-1.i386.rpm
464338c3dff8bd6719aede959b9b3587  rh-postgresql-docs-7.3.10-1.i386.rpm
450cec78eabdea78015b69d15f4e5b8e  rh-postgresql-jdbc-7.3.10-1.i386.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
e127dd6f8dd557a3dece04510b3cb886  rh-postgresql-pl-7.3.10-1.i386.rpm
20ef74f92403d4270e0993f4c1e3476e  rh-postgresql-python-7.3.10-1.i386.rpm
90988ac2ef44662c4af61ab2d1bded66  rh-postgresql-server-7.3.10-1.i386.rpm
262cd45feb50dfa6ab7277d562445dfe  rh-postgresql-tcl-7.3.10-1.i386.rpm
437bfa0eb7c527ffe95614d8cdcb9d7d  rh-postgresql-test-7.3.10-1.i386.rpm

ia64:
65f67a78e1e365fa7e833c981b9f8198  rh-postgresql-7.3.10-1.ia64.rpm
a2383dc1b7a6cf2097638264034319a7  rh-postgresql-contrib-7.3.10-1.ia64.rpm
169c05674b5d79fdae4b98167b8cd9be  rh-postgresql-devel-7.3.10-1.ia64.rpm
4cdaee2c5988a1322378f387850c580e  rh-postgresql-docs-7.3.10-1.ia64.rpm
4f273bc9daee6c12d88fd562546561b1  rh-postgresql-jdbc-7.3.10-1.ia64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
21e0b02c3309c23d2b5f4676430817d9  rh-postgresql-libs-7.3.10-1.ia64.rpm
886f9e90347b4443dd990631e25109dd  rh-postgresql-pl-7.3.10-1.ia64.rpm
b6f9531b0dbd402a6c9413b40c3286fb  rh-postgresql-python-7.3.10-1.ia64.rpm
3acc83064f78880934f698a74ee117e8  rh-postgresql-server-7.3.10-1.ia64.rpm
3e60f3aad251079fcb5c9cc270dbf6d0  rh-postgresql-tcl-7.3.10-1.ia64.rpm
400108517c771891083244b56bdc7918  rh-postgresql-test-7.3.10-1.ia64.rpm

x86_64:
12d545f9a1fb96917314edc7ab7a899c  rh-postgresql-7.3.10-1.x86_64.rpm
8bf74a618da18fb79471ced0addb51a4  rh-postgresql-contrib-7.3.10-1.x86_64.rpm
3521d8ef6a7aec53b16eb2ccf820c19a  rh-postgresql-devel-7.3.10-1.x86_64.rpm
476ea9eeff93069d8b532d2c72f42b30  rh-postgresql-docs-7.3.10-1.x86_64.rpm
f52eabdc6df3510fa95fcbac36890b81  rh-postgresql-jdbc-7.3.10-1.x86_64.rpm
71b053c832952d0d76442c1bf6cc752d  rh-postgresql-libs-7.3.10-1.i386.rpm
35d2b6cd11417def624b0b26597b06bb  rh-postgresql-libs-7.3.10-1.x86_64.rpm
3660b4e3a4f05178f87424ec85f77ca0  rh-postgresql-pl-7.3.10-1.x86_64.rpm
1b6d555e557142aa1749d570afb5258d  rh-postgresql-python-7.3.10-1.x86_64.rpm
6d259b3e26f91817db6eded98c979bd0  rh-postgresql-server-7.3.10-1.x86_64.rpm
abd82efd41b8875736b3f2f1149aceac  rh-postgresql-tcl-7.3.10-1.x86_64.rpm
3fb702998409f1952b0d4c909738b11d  rh-postgresql-test-7.3.10-1.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/postgresql-7.4.8-1.RHEL4.1.src.rpm
5246f2dab2ee5cdfa32fa70b634260b6  postgresql-7.4.8-1.RHEL4.1.src.rpm

i386:
6498fde9d47bd2de8a23632795f4ff79  postgresql-7.4.8-1.RHEL4.1.i386.rpm
6c78bcb9f5b4ec6403cad5442da7d455  postgresql-contrib-7.4.8-1.RHEL4.1.i386.rpm
859488c7b7c38509c5adde4bdf2f0918  postgresql-devel-7.4.8-1.RHEL4.1.i386.rpm
bd6bfb6c1ef46d0e6310495035828b25  postgresql-docs-7.4.8-1.RHEL4.1.i386.rpm
d352244c21953685f5736f2140e0c61f  postgresql-jdbc-7.4.8-1.RHEL4.1.i386.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
1d945bd131269155f47e6a6f8be5beb3  postgresql-pl-7.4.8-1.RHEL4.1.i386.rpm
582cff60e96d9a32a329eb7937baa0f5  postgresql-python-7.4.8-1.RHEL4.1.i386.rpm
4b0a10603cc083b5b48cb0cc06ccb198  postgresql-server-7.4.8-1.RHEL4.1.i386.rpm
14454acde23699f6c60bbb1d0870f238  postgresql-tcl-7.4.8-1.RHEL4.1.i386.rpm
4101d03659eefe4e0c7d708c680253b5  postgresql-test-7.4.8-1.RHEL4.1.i386.rpm

ia64:
87105bd9493daa0d39365a5b5647a473  postgresql-7.4.8-1.RHEL4.1.ia64.rpm
0eac2cb6e4c4fe8b924471a3ab2578b5  postgresql-contrib-7.4.8-1.RHEL4.1.ia64.rpm
f56bdf0c4e40807a70b304d3f3ec1b3d  postgresql-devel-7.4.8-1.RHEL4.1.ia64.rpm
c5b1e92d70becc3d0359a147a25a89ee  postgresql-docs-7.4.8-1.RHEL4.1.ia64.rpm
b37cda505a724a04580996da11a02eb1  postgresql-jdbc-7.4.8-1.RHEL4.1.ia64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
f3c6791f64633d7641eb8366903ba1ff  postgresql-libs-7.4.8-1.RHEL4.1.ia64.rpm
07f63b8824d4f3cac26acdb393a719a3  postgresql-pl-7.4.8-1.RHEL4.1.ia64.rpm
e2065703b868328719a844babb38b23d  postgresql-python-7.4.8-1.RHEL4.1.ia64.rpm
7eca64d8f62fce694a8ffd755095add6  postgresql-server-7.4.8-1.RHEL4.1.ia64.rpm
da2731177c49d3d17403111bed372773  postgresql-tcl-7.4.8-1.RHEL4.1.ia64.rpm
5f675c969e713d8549d25026471e39af  postgresql-test-7.4.8-1.RHEL4.1.ia64.rpm

ppc:
c2e46dbdb3f8a4a1471e05c117cedcba  postgresql-7.4.8-1.RHEL4.1.ppc.rpm
e466ea0d46f866404b7f5962fce96370  postgresql-contrib-7.4.8-1.RHEL4.1.ppc.rpm
043527687777f3da0ca853987c1677f8  postgresql-devel-7.4.8-1.RHEL4.1.ppc.rpm
24b229ebd3cc0b25fb9a0d452583899f  postgresql-docs-7.4.8-1.RHEL4.1.ppc.rpm
f9a6c131f7bcd9b9a40bdda4a257375f  postgresql-jdbc-7.4.8-1.RHEL4.1.ppc.rpm
d8e1e9580e66c4b238cf2ee0d817383a  postgresql-libs-7.4.8-1.RHEL4.1.ppc.rpm
4f76624ad1e99b9674de3d91ba7ad907  postgresql-libs-7.4.8-1.RHEL4.1.ppc64.rpm
17fbf358f08cee6effa1b7dea5254dc5  postgresql-pl-7.4.8-1.RHEL4.1.ppc.rpm
c5c6a0e6ae52721e1470c8594fd4b9d5  postgresql-python-7.4.8-1.RHEL4.1.ppc.rpm
7611f913aba6ba09c0665e8c593d56f7  postgresql-server-7.4.8-1.RHEL4.1.ppc.rpm
0ee8db4cdf15fef399e2d5d2059e2dc8  postgresql-tcl-7.4.8-1.RHEL4.1.ppc.rpm
c587392e7b730b842d0200d628a9c377  postgresql-test-7.4.8-1.RHEL4.1.ppc.rpm

s390:
734c0986df98433a6a87b55033177342  postgresql-7.4.8-1.RHEL4.1.s390.rpm
2787f4be865bd43b30b318dbe965c83d  postgresql-contrib-7.4.8-1.RHEL4.1.s390.rpm
67fdbf4d36801da053f61d5396953303  postgresql-devel-7.4.8-1.RHEL4.1.s390.rpm
0ba6c378b8c89ce7d6f1dba413f6c2ad  postgresql-docs-7.4.8-1.RHEL4.1.s390.rpm
1b694a201fef48a0f103bccf5814a03b  postgresql-jdbc-7.4.8-1.RHEL4.1.s390.rpm
112c8e6513abf693362779739181263a  postgresql-libs-7.4.8-1.RHEL4.1.s390.rpm
199c70eb065f86a0a81e8fa9a4e56844  postgresql-pl-7.4.8-1.RHEL4.1.s390.rpm
36abd88dd180ce0f8fb2decfd9583066  postgresql-python-7.4.8-1.RHEL4.1.s390.rpm
858c24cd14a549ca76f489eff4aa2372  postgresql-server-7.4.8-1.RHEL4.1.s390.rpm
56935d6d022fad09d134176675b9f550  postgresql-tcl-7.4.8-1.RHEL4.1.s390.rpm
fd025816534aa22093fc231dd2d3bf38  postgresql-test-7.4.8-1.RHEL4.1.s390.rpm

s390x:
18f54e63e499f7346dace6d6a94f145b  postgresql-7.4.8-1.RHEL4.1.s390x.rpm
e811e52a44b9bf70af9071fb3e6a313d  postgresql-contrib-7.4.8-1.RHEL4.1.s390x.rpm
438283d89aca883291d06455cf32d928  postgresql-devel-7.4.8-1.RHEL4.1.s390x.rpm
8ab61b869c463dc355bca20452914720  postgresql-docs-7.4.8-1.RHEL4.1.s390x.rpm
0fdd2e7055f94e79aa30032e1d4fbcb8  postgresql-jdbc-7.4.8-1.RHEL4.1.s390x.rpm
112c8e6513abf693362779739181263a  postgresql-libs-7.4.8-1.RHEL4.1.s390.rpm
2f245568665dd85b6b8d7bf1e4e51bd5  postgresql-libs-7.4.8-1.RHEL4.1.s390x.rpm
25d4cc798b5c17a647d8a504e51d1f7e  postgresql-pl-7.4.8-1.RHEL4.1.s390x.rpm
2e762953950e632e6423d4170c66e7f7  postgresql-python-7.4.8-1.RHEL4.1.s390x.rpm
f0f3b597ebd8df2bf33b83f54a735eb1  postgresql-server-7.4.8-1.RHEL4.1.s390x.rpm
4a448ccdd7f6ed68c13b36150924b1c5  postgresql-tcl-7.4.8-1.RHEL4.1.s390x.rpm
5736c1e803f0c1e3290c3666eb2b6f5b  postgresql-test-7.4.8-1.RHEL4.1.s390x.rpm

x86_64:
072fda6592340837c8b669975b1e3a2e  postgresql-7.4.8-1.RHEL4.1.x86_64.rpm
5296fe84a8742e76410f5ded2544c3a1  postgresql-contrib-7.4.8-1.RHEL4.1.x86_64.rpm
7c1ee74ebf99f30709ee34df8f8243e7  postgresql-devel-7.4.8-1.RHEL4.1.x86_64.rpm
bb3093057655d1485e830d606d9c68e3  postgresql-docs-7.4.8-1.RHEL4.1.x86_64.rpm
f2a7b53097f75df092da4ef58d365f85  postgresql-jdbc-7.4.8-1.RHEL4.1.x86_64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
66639a454d1436ab4e82bac418296de7  postgresql-libs-7.4.8-1.RHEL4.1.x86_64.rpm
bd91ce2ace9017ca634cc41ba61c81dd  postgresql-pl-7.4.8-1.RHEL4.1.x86_64.rpm
12df14d97bfcb49978e6dba1891ce079  postgresql-python-7.4.8-1.RHEL4.1.x86_64.rpm
983c562d2ff03d75be6f76742adc0a84  postgresql-server-7.4.8-1.RHEL4.1.x86_64.rpm
265a5b63e8696f706c04fc8fc3c09da2  postgresql-tcl-7.4.8-1.RHEL4.1.x86_64.rpm
03d331d477a9135b825b7ee522b2001c  postgresql-test-7.4.8-1.RHEL4.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/postgresql-7.4.8-1.RHEL4.1.src.rpm
5246f2dab2ee5cdfa32fa70b634260b6  postgresql-7.4.8-1.RHEL4.1.src.rpm

i386:
6498fde9d47bd2de8a23632795f4ff79  postgresql-7.4.8-1.RHEL4.1.i386.rpm
6c78bcb9f5b4ec6403cad5442da7d455  postgresql-contrib-7.4.8-1.RHEL4.1.i386.rpm
859488c7b7c38509c5adde4bdf2f0918  postgresql-devel-7.4.8-1.RHEL4.1.i386.rpm
bd6bfb6c1ef46d0e6310495035828b25  postgresql-docs-7.4.8-1.RHEL4.1.i386.rpm
d352244c21953685f5736f2140e0c61f  postgresql-jdbc-7.4.8-1.RHEL4.1.i386.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
1d945bd131269155f47e6a6f8be5beb3  postgresql-pl-7.4.8-1.RHEL4.1.i386.rpm
582cff60e96d9a32a329eb7937baa0f5  postgresql-python-7.4.8-1.RHEL4.1.i386.rpm
4b0a10603cc083b5b48cb0cc06ccb198  postgresql-server-7.4.8-1.RHEL4.1.i386.rpm
14454acde23699f6c60bbb1d0870f238  postgresql-tcl-7.4.8-1.RHEL4.1.i386.rpm
4101d03659eefe4e0c7d708c680253b5  postgresql-test-7.4.8-1.RHEL4.1.i386.rpm

x86_64:
072fda6592340837c8b669975b1e3a2e  postgresql-7.4.8-1.RHEL4.1.x86_64.rpm
5296fe84a8742e76410f5ded2544c3a1  postgresql-contrib-7.4.8-1.RHEL4.1.x86_64.rpm
7c1ee74ebf99f30709ee34df8f8243e7  postgresql-devel-7.4.8-1.RHEL4.1.x86_64.rpm
bb3093057655d1485e830d606d9c68e3  postgresql-docs-7.4.8-1.RHEL4.1.x86_64.rpm
f2a7b53097f75df092da4ef58d365f85  postgresql-jdbc-7.4.8-1.RHEL4.1.x86_64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
66639a454d1436ab4e82bac418296de7  postgresql-libs-7.4.8-1.RHEL4.1.x86_64.rpm
bd91ce2ace9017ca634cc41ba61c81dd  postgresql-pl-7.4.8-1.RHEL4.1.x86_64.rpm
12df14d97bfcb49978e6dba1891ce079  postgresql-python-7.4.8-1.RHEL4.1.x86_64.rpm
983c562d2ff03d75be6f76742adc0a84  postgresql-server-7.4.8-1.RHEL4.1.x86_64.rpm
265a5b63e8696f706c04fc8fc3c09da2  postgresql-tcl-7.4.8-1.RHEL4.1.x86_64.rpm
03d331d477a9135b825b7ee522b2001c  postgresql-test-7.4.8-1.RHEL4.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/postgresql-7.4.8-1.RHEL4.1.src.rpm
5246f2dab2ee5cdfa32fa70b634260b6  postgresql-7.4.8-1.RHEL4.1.src.rpm

i386:
6498fde9d47bd2de8a23632795f4ff79  postgresql-7.4.8-1.RHEL4.1.i386.rpm
6c78bcb9f5b4ec6403cad5442da7d455  postgresql-contrib-7.4.8-1.RHEL4.1.i386.rpm
859488c7b7c38509c5adde4bdf2f0918  postgresql-devel-7.4.8-1.RHEL4.1.i386.rpm
bd6bfb6c1ef46d0e6310495035828b25  postgresql-docs-7.4.8-1.RHEL4.1.i386.rpm
d352244c21953685f5736f2140e0c61f  postgresql-jdbc-7.4.8-1.RHEL4.1.i386.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
1d945bd131269155f47e6a6f8be5beb3  postgresql-pl-7.4.8-1.RHEL4.1.i386.rpm
582cff60e96d9a32a329eb7937baa0f5  postgresql-python-7.4.8-1.RHEL4.1.i386.rpm
4b0a10603cc083b5b48cb0cc06ccb198  postgresql-server-7.4.8-1.RHEL4.1.i386.rpm
14454acde23699f6c60bbb1d0870f238  postgresql-tcl-7.4.8-1.RHEL4.1.i386.rpm
4101d03659eefe4e0c7d708c680253b5  postgresql-test-7.4.8-1.RHEL4.1.i386.rpm

ia64:
87105bd9493daa0d39365a5b5647a473  postgresql-7.4.8-1.RHEL4.1.ia64.rpm
0eac2cb6e4c4fe8b924471a3ab2578b5  postgresql-contrib-7.4.8-1.RHEL4.1.ia64.rpm
f56bdf0c4e40807a70b304d3f3ec1b3d  postgresql-devel-7.4.8-1.RHEL4.1.ia64.rpm
c5b1e92d70becc3d0359a147a25a89ee  postgresql-docs-7.4.8-1.RHEL4.1.ia64.rpm
b37cda505a724a04580996da11a02eb1  postgresql-jdbc-7.4.8-1.RHEL4.1.ia64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
f3c6791f64633d7641eb8366903ba1ff  postgresql-libs-7.4.8-1.RHEL4.1.ia64.rpm
07f63b8824d4f3cac26acdb393a719a3  postgresql-pl-7.4.8-1.RHEL4.1.ia64.rpm
e2065703b868328719a844babb38b23d  postgresql-python-7.4.8-1.RHEL4.1.ia64.rpm
7eca64d8f62fce694a8ffd755095add6  postgresql-server-7.4.8-1.RHEL4.1.ia64.rpm
da2731177c49d3d17403111bed372773  postgresql-tcl-7.4.8-1.RHEL4.1.ia64.rpm
5f675c969e713d8549d25026471e39af  postgresql-test-7.4.8-1.RHEL4.1.ia64.rpm

x86_64:
072fda6592340837c8b669975b1e3a2e  postgresql-7.4.8-1.RHEL4.1.x86_64.rpm
5296fe84a8742e76410f5ded2544c3a1  postgresql-contrib-7.4.8-1.RHEL4.1.x86_64.rpm
7c1ee74ebf99f30709ee34df8f8243e7  postgresql-devel-7.4.8-1.RHEL4.1.x86_64.rpm
bb3093057655d1485e830d606d9c68e3  postgresql-docs-7.4.8-1.RHEL4.1.x86_64.rpm
f2a7b53097f75df092da4ef58d365f85  postgresql-jdbc-7.4.8-1.RHEL4.1.x86_64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
66639a454d1436ab4e82bac418296de7  postgresql-libs-7.4.8-1.RHEL4.1.x86_64.rpm
bd91ce2ace9017ca634cc41ba61c81dd  postgresql-pl-7.4.8-1.RHEL4.1.x86_64.rpm
12df14d97bfcb49978e6dba1891ce079  postgresql-python-7.4.8-1.RHEL4.1.x86_64.rpm
983c562d2ff03d75be6f76742adc0a84  postgresql-server-7.4.8-1.RHEL4.1.x86_64.rpm
265a5b63e8696f706c04fc8fc3c09da2  postgresql-tcl-7.4.8-1.RHEL4.1.x86_64.rpm
03d331d477a9135b825b7ee522b2001c  postgresql-test-7.4.8-1.RHEL4.1.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/postgresql-7.4.8-1.RHEL4.1.src.rpm
5246f2dab2ee5cdfa32fa70b634260b6  postgresql-7.4.8-1.RHEL4.1.src.rpm

i386:
6498fde9d47bd2de8a23632795f4ff79  postgresql-7.4.8-1.RHEL4.1.i386.rpm
6c78bcb9f5b4ec6403cad5442da7d455  postgresql-contrib-7.4.8-1.RHEL4.1.i386.rpm
859488c7b7c38509c5adde4bdf2f0918  postgresql-devel-7.4.8-1.RHEL4.1.i386.rpm
bd6bfb6c1ef46d0e6310495035828b25  postgresql-docs-7.4.8-1.RHEL4.1.i386.rpm
d352244c21953685f5736f2140e0c61f  postgresql-jdbc-7.4.8-1.RHEL4.1.i386.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
1d945bd131269155f47e6a6f8be5beb3  postgresql-pl-7.4.8-1.RHEL4.1.i386.rpm
582cff60e96d9a32a329eb7937baa0f5  postgresql-python-7.4.8-1.RHEL4.1.i386.rpm
4b0a10603cc083b5b48cb0cc06ccb198  postgresql-server-7.4.8-1.RHEL4.1.i386.rpm
14454acde23699f6c60bbb1d0870f238  postgresql-tcl-7.4.8-1.RHEL4.1.i386.rpm
4101d03659eefe4e0c7d708c680253b5  postgresql-test-7.4.8-1.RHEL4.1.i386.rpm

ia64:
87105bd9493daa0d39365a5b5647a473  postgresql-7.4.8-1.RHEL4.1.ia64.rpm
0eac2cb6e4c4fe8b924471a3ab2578b5  postgresql-contrib-7.4.8-1.RHEL4.1.ia64.rpm
f56bdf0c4e40807a70b304d3f3ec1b3d  postgresql-devel-7.4.8-1.RHEL4.1.ia64.rpm
c5b1e92d70becc3d0359a147a25a89ee  postgresql-docs-7.4.8-1.RHEL4.1.ia64.rpm
b37cda505a724a04580996da11a02eb1  postgresql-jdbc-7.4.8-1.RHEL4.1.ia64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
f3c6791f64633d7641eb8366903ba1ff  postgresql-libs-7.4.8-1.RHEL4.1.ia64.rpm
07f63b8824d4f3cac26acdb393a719a3  postgresql-pl-7.4.8-1.RHEL4.1.ia64.rpm
e2065703b868328719a844babb38b23d  postgresql-python-7.4.8-1.RHEL4.1.ia64.rpm
7eca64d8f62fce694a8ffd755095add6  postgresql-server-7.4.8-1.RHEL4.1.ia64.rpm
da2731177c49d3d17403111bed372773  postgresql-tcl-7.4.8-1.RHEL4.1.ia64.rpm
5f675c969e713d8549d25026471e39af  postgresql-test-7.4.8-1.RHEL4.1.ia64.rpm

x86_64:
072fda6592340837c8b669975b1e3a2e  postgresql-7.4.8-1.RHEL4.1.x86_64.rpm
5296fe84a8742e76410f5ded2544c3a1  postgresql-contrib-7.4.8-1.RHEL4.1.x86_64.rpm
7c1ee74ebf99f30709ee34df8f8243e7  postgresql-devel-7.4.8-1.RHEL4.1.x86_64.rpm
bb3093057655d1485e830d606d9c68e3  postgresql-docs-7.4.8-1.RHEL4.1.x86_64.rpm
f2a7b53097f75df092da4ef58d365f85  postgresql-jdbc-7.4.8-1.RHEL4.1.x86_64.rpm
abee0bcbeb004637ad9a70b6eb41c06f  postgresql-libs-7.4.8-1.RHEL4.1.i386.rpm
66639a454d1436ab4e82bac418296de7  postgresql-libs-7.4.8-1.RHEL4.1.x86_64.rpm
bd91ce2ace9017ca634cc41ba61c81dd  postgresql-pl-7.4.8-1.RHEL4.1.x86_64.rpm
12df14d97bfcb49978e6dba1891ce079  postgresql-python-7.4.8-1.RHEL4.1.x86_64.rpm
983c562d2ff03d75be6f76742adc0a84  postgresql-server-7.4.8-1.RHEL4.1.x86_64.rpm
265a5b63e8696f706c04fc8fc3c09da2  postgresql-tcl-7.4.8-1.RHEL4.1.x86_64.rpm
03d331d477a9135b825b7ee522b2001c  postgresql-test-7.4.8-1.RHEL4.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1409
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1410

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD4DBQFCnbo1XlSAg2UNWIIRAu1pAJiujRiWvZa3w4CzT1oqkxkmuczoAJ0YkvjW
jt2OvLRbT0R8/2zf316BPQ==
=fsFk
- -----END PGP SIGNATURE-----


- -- 
Enterprise-watch-list mailing list
Enterprise-watch-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/enterprise-watch-list


3.

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: openssl security update
Advisory ID:       RHSA-2005:476-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-476.html
Issue date:        2005-06-01
Updated on:        2005-06-01
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0975 CAN-2005-0109
- - ---------------------------------------------------------------------

1. Summary:

Updated OpenSSL packages that fix security issues are now available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength
general purpose cryptography library.

Colin Percival reported a cache timing attack that could allow a malicious
local user to gain portions of cryptographic keys.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the name
CAN-2005-0109 to the issue.  The OpenSSL library has been patched to add a
new fixed-window mod_exp implementation as default for RSA, DSA, and DH
private-key operations.  This patch is designed to mitigate cache timing
and potentially related attacks.

A flaw was found in the way the der_chop script creates temporary files. It
is possible that a malicious local user could cause der_chop to overwrite
files (CAN-2004-0975).  The der_chop script was deprecated and has been
removed from these updated packages.  Red Hat Enterprise Linux 4 did not
ship der_chop and is therefore not vulnerable to this issue.

Users are advised to update to these erratum packages which contain patches
to correct these issues.

Please note: After installing this update, users are advised to either
restart all services that use OpenSSL or restart their system.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

136302 - CAN-2004-0975 temporary file vulnerabilities in der_chop script
140061 - CAN-2004-0975 temporary file vulnerabilities in der_chop script
157631 - CAN-2005-0109 timing attack on OpenSSL with HT


6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl-0.9.6b-39.src.rpm
2202dc14a7399f6ff8fcd41fc94e8dca  openssl-0.9.6b-39.src.rpm
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl095a-0.9.5a-25.src.rpm
102f28d06aea7cf3bb34a56cd5da0090  openssl095a-0.9.5a-25.src.rpm
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/openssl096-0.9.6-25.8.src.rpm
8bafb6187e44ed15d98bd74c0b5cad84  openssl096-0.9.6-25.8.src.rpm

i386:
c79dea648676c22fb5a009e1f39e5ea3  openssl-0.9.6b-39.i386.rpm
56186ba8a320a509946b9d692f55f3cd  openssl-0.9.6b-39.i686.rpm
381085275ca47b015e00cb6d8623ecc5  openssl-devel-0.9.6b-39.i386.rpm
f91c8281f03b68b7b5ebdfb487890405  openssl-perl-0.9.6b-39.i386.rpm
653b775edf3a0a9349f6fb35027c6143  openssl095a-0.9.5a-25.i386.rpm
10964869b19af694a5d0514cb36fa205  openssl096-0.9.6-25.8.i386.rpm

ia64:
f3cb5aa3d4e294ae79fd2330011b5f08  openssl-0.9.6b-39.ia64.rpm
2b9344fb71bb4dee0685dd14e07f9274  openssl-devel-0.9.6b-39.ia64.rpm
7167fd4a10d412dcb565f58debb67ac4  openssl-perl-0.9.6b-39.ia64.rpm
935dbc0ded3197d15a7fa5f0dfe373e4  openssl095a-0.9.5a-25.ia64.rpm
7bf31fe46f5eaccb2388b2cda4253cb9  openssl096-0.9.6-25.8.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl-0.9.6b-39.src.rpm
2202dc14a7399f6ff8fcd41fc94e8dca  openssl-0.9.6b-39.src.rpm
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl095a-0.9.5a-25.src.rpm
102f28d06aea7cf3bb34a56cd5da0090  openssl095a-0.9.5a-25.src.rpm
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/openssl096-0.9.6-25.8.src.rpm
8bafb6187e44ed15d98bd74c0b5cad84  openssl096-0.9.6-25.8.src.rpm

ia64:
f3cb5aa3d4e294ae79fd2330011b5f08  openssl-0.9.6b-39.ia64.rpm
2b9344fb71bb4dee0685dd14e07f9274  openssl-devel-0.9.6b-39.ia64.rpm
7167fd4a10d412dcb565f58debb67ac4  openssl-perl-0.9.6b-39.ia64.rpm
935dbc0ded3197d15a7fa5f0dfe373e4  openssl095a-0.9.5a-25.ia64.rpm
7bf31fe46f5eaccb2388b2cda4253cb9  openssl096-0.9.6-25.8.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/openssl-0.9.6b-39.src.rpm
2202dc14a7399f6ff8fcd41fc94e8dca  openssl-0.9.6b-39.src.rpm

i386:
c79dea648676c22fb5a009e1f39e5ea3  openssl-0.9.6b-39.i386.rpm
56186ba8a320a509946b9d692f55f3cd  openssl-0.9.6b-39.i686.rpm
381085275ca47b015e00cb6d8623ecc5  openssl-devel-0.9.6b-39.i386.rpm
f91c8281f03b68b7b5ebdfb487890405  openssl-perl-0.9.6b-39.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/openssl-0.9.6b-39.src.rpm
2202dc14a7399f6ff8fcd41fc94e8dca  openssl-0.9.6b-39.src.rpm

i386:
c79dea648676c22fb5a009e1f39e5ea3  openssl-0.9.6b-39.i386.rpm
56186ba8a320a509946b9d692f55f3cd  openssl-0.9.6b-39.i686.rpm
381085275ca47b015e00cb6d8623ecc5  openssl-devel-0.9.6b-39.i386.rpm
f91c8281f03b68b7b5ebdfb487890405  openssl-perl-0.9.6b-39.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssl-0.9.7a-33.15.src.rpm
fecbb9965efea588bcfc4ccbd72768fd  openssl-0.9.7a-33.15.src.rpm
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openssl096b-0.9.6b-16.22.3.src.rpm
46629205793cb96e5cc327b8b179051f  openssl096b-0.9.6b-16.22.3.src.rpm

i386:
2b9f1aa02444b77b229d5879b1726a86  openssl-0.9.7a-33.15.i386.rpm
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
6208a674e905b110d72973e0adaf6cf3  openssl-devel-0.9.7a-33.15.i386.rpm
3ad6a8e8713e716a6229e95a43b890a1  openssl-perl-0.9.7a-33.15.i386.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm

ia64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
ec72eec3236de964420dc9e38ae8d71a  openssl-0.9.7a-33.15.ia64.rpm
b266014efab5aa58e0fd83b0959d54df  openssl-devel-0.9.7a-33.15.ia64.rpm
459eeb342e024e624d6268ed4e9eec9d  openssl-perl-0.9.7a-33.15.ia64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
94b2856c1e42167fca7391daec2a8227  openssl096b-0.9.6b-16.22.3.ia64.rpm

ppc:
44e5f6bf71e3981f7844e85b29d530df  openssl-0.9.7a-33.15.ppc.rpm
ecdfa92368a84e089d900f0a629a1170  openssl-0.9.7a-33.15.ppc64.rpm
2ca81b2af2ba7375c77b1170df585520  openssl-devel-0.9.7a-33.15.ppc.rpm
7c6ab2cf3daff6a488b064366026b2ef  openssl-perl-0.9.7a-33.15.ppc.rpm
162f4749b30290556231124094cd2bad  openssl096b-0.9.6b-16.22.3.ppc.rpm

s390:
cea7e0a81d9c7e905c44a66ef0aac7bc  openssl-0.9.7a-33.15.s390.rpm
51266bee2ab9d83a40da1ff623b3637c  openssl-devel-0.9.7a-33.15.s390.rpm
3d4c371a3424bcfeff87341706eed0cc  openssl-perl-0.9.7a-33.15.s390.rpm
f1e853444cd2e99374ca8a70a552437d  openssl096b-0.9.6b-16.22.3.s390.rpm

s390x:
cea7e0a81d9c7e905c44a66ef0aac7bc  openssl-0.9.7a-33.15.s390.rpm
63bc66c55d18699ad8acfbf1730d02be  openssl-0.9.7a-33.15.s390x.rpm
43ee653eba3bcd8281231a3124e1d635  openssl-devel-0.9.7a-33.15.s390x.rpm
c422bb5d666389ef0cf101ff327f304e  openssl-perl-0.9.7a-33.15.s390x.rpm
f1e853444cd2e99374ca8a70a552437d  openssl096b-0.9.6b-16.22.3.s390.rpm

x86_64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
14aa11421e2f27ebe03b961ddc067a89  openssl-0.9.7a-33.15.x86_64.rpm
69146c5d0a1e0b1b42a1446ad5f28d65  openssl-devel-0.9.7a-33.15.x86_64.rpm
9643ce541a386847bf188db74e0ce92e  openssl-perl-0.9.7a-33.15.x86_64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
497fcbbdf8d777529bbb0f0b9967d179  openssl096b-0.9.6b-16.22.3.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssl-0.9.7a-33.15.src.rpm
fecbb9965efea588bcfc4ccbd72768fd  openssl-0.9.7a-33.15.src.rpm
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openssl096b-0.9.6b-16.22.3.src.rpm
46629205793cb96e5cc327b8b179051f  openssl096b-0.9.6b-16.22.3.src.rpm

i386:
2b9f1aa02444b77b229d5879b1726a86  openssl-0.9.7a-33.15.i386.rpm
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
6208a674e905b110d72973e0adaf6cf3  openssl-devel-0.9.7a-33.15.i386.rpm
3ad6a8e8713e716a6229e95a43b890a1  openssl-perl-0.9.7a-33.15.i386.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm

x86_64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
14aa11421e2f27ebe03b961ddc067a89  openssl-0.9.7a-33.15.x86_64.rpm
69146c5d0a1e0b1b42a1446ad5f28d65  openssl-devel-0.9.7a-33.15.x86_64.rpm
9643ce541a386847bf188db74e0ce92e  openssl-perl-0.9.7a-33.15.x86_64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
497fcbbdf8d777529bbb0f0b9967d179  openssl096b-0.9.6b-16.22.3.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssl-0.9.7a-33.15.src.rpm
fecbb9965efea588bcfc4ccbd72768fd  openssl-0.9.7a-33.15.src.rpm
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openssl096b-0.9.6b-16.22.3.src.rpm
46629205793cb96e5cc327b8b179051f  openssl096b-0.9.6b-16.22.3.src.rpm

i386:
2b9f1aa02444b77b229d5879b1726a86  openssl-0.9.7a-33.15.i386.rpm
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
6208a674e905b110d72973e0adaf6cf3  openssl-devel-0.9.7a-33.15.i386.rpm
3ad6a8e8713e716a6229e95a43b890a1  openssl-perl-0.9.7a-33.15.i386.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm

ia64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
ec72eec3236de964420dc9e38ae8d71a  openssl-0.9.7a-33.15.ia64.rpm
b266014efab5aa58e0fd83b0959d54df  openssl-devel-0.9.7a-33.15.ia64.rpm
459eeb342e024e624d6268ed4e9eec9d  openssl-perl-0.9.7a-33.15.ia64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
94b2856c1e42167fca7391daec2a8227  openssl096b-0.9.6b-16.22.3.ia64.rpm

x86_64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
14aa11421e2f27ebe03b961ddc067a89  openssl-0.9.7a-33.15.x86_64.rpm
69146c5d0a1e0b1b42a1446ad5f28d65  openssl-devel-0.9.7a-33.15.x86_64.rpm
9643ce541a386847bf188db74e0ce92e  openssl-perl-0.9.7a-33.15.x86_64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
497fcbbdf8d777529bbb0f0b9967d179  openssl096b-0.9.6b-16.22.3.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssl-0.9.7a-33.15.src.rpm
fecbb9965efea588bcfc4ccbd72768fd  openssl-0.9.7a-33.15.src.rpm
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openssl096b-0.9.6b-16.22.3.src.rpm
46629205793cb96e5cc327b8b179051f  openssl096b-0.9.6b-16.22.3.src.rpm

i386:
2b9f1aa02444b77b229d5879b1726a86  openssl-0.9.7a-33.15.i386.rpm
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
6208a674e905b110d72973e0adaf6cf3  openssl-devel-0.9.7a-33.15.i386.rpm
3ad6a8e8713e716a6229e95a43b890a1  openssl-perl-0.9.7a-33.15.i386.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm

ia64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
ec72eec3236de964420dc9e38ae8d71a  openssl-0.9.7a-33.15.ia64.rpm
b266014efab5aa58e0fd83b0959d54df  openssl-devel-0.9.7a-33.15.ia64.rpm
459eeb342e024e624d6268ed4e9eec9d  openssl-perl-0.9.7a-33.15.ia64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
94b2856c1e42167fca7391daec2a8227  openssl096b-0.9.6b-16.22.3.ia64.rpm

x86_64:
885db73998e10cb54b063e1a70accbb4  openssl-0.9.7a-33.15.i686.rpm
14aa11421e2f27ebe03b961ddc067a89  openssl-0.9.7a-33.15.x86_64.rpm
69146c5d0a1e0b1b42a1446ad5f28d65  openssl-devel-0.9.7a-33.15.x86_64.rpm
9643ce541a386847bf188db74e0ce92e  openssl-perl-0.9.7a-33.15.x86_64.rpm
597de32a07318098040a8a7b307b426c  openssl096b-0.9.6b-16.22.3.i386.rpm
497fcbbdf8d777529bbb0f0b9967d179  openssl096b-0.9.6b-16.22.3.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssl-0.9.7a-43.2.src.rpm
632bcfec21c365a0b85a9ede55eb5cf1  openssl-0.9.7a-43.2.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openssl096b-0.9.6b-22.3.src.rpm
d4d515e7811eb994384a7591fdba9e7f  openssl096b-0.9.6b-22.3.src.rpm

i386:
487ce4c45ebf66926274b1253a848cd4  openssl-0.9.7a-43.2.i386.rpm
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
8978b9729c1a20fd03e983114b130dd0  openssl-devel-0.9.7a-43.2.i386.rpm
3ca9137b86397258d518bdc259ac4b78  openssl-perl-0.9.7a-43.2.i386.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm

ia64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
2982807a86a9014fc24244313fa94eab  openssl-0.9.7a-43.2.ia64.rpm
70bd62608e952f884fd5a28d19bd96a7  openssl-devel-0.9.7a-43.2.ia64.rpm
c7a9c09ff8873c7a64186f928b14baad  openssl-perl-0.9.7a-43.2.ia64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
9dd474ab5fd73f0a83a9b0d1953f5794  openssl096b-0.9.6b-22.3.ia64.rpm

ppc:
c8c471cb2bd9b2792b34d2af3892bd4c  openssl-0.9.7a-43.2.ppc.rpm
a08ad5a5c884cd358de86f47da1825b0  openssl-0.9.7a-43.2.ppc64.rpm
146d7e707e729f2d7df6554623e311b4  openssl-devel-0.9.7a-43.2.ppc.rpm
9da94be3f0733cf0937ec83a74ddefaf  openssl-perl-0.9.7a-43.2.ppc.rpm
3b95181c557862605da524b478f95895  openssl096b-0.9.6b-22.3.ppc.rpm

s390:
88f84e9a7d2ec9d52e1bf61ca46efbe2  openssl-0.9.7a-43.2.s390.rpm
6abebec07c747455150652f0657386d4  openssl-devel-0.9.7a-43.2.s390.rpm
410612c59b990ee7031654a4bc3d5be2  openssl-perl-0.9.7a-43.2.s390.rpm
7c1d10a24e9f4a3443ade30b09560f44  openssl096b-0.9.6b-22.3.s390.rpm

s390x:
88f84e9a7d2ec9d52e1bf61ca46efbe2  openssl-0.9.7a-43.2.s390.rpm
7112d8f2afc723f566f92685338daa0e  openssl-0.9.7a-43.2.s390x.rpm
fd8089721740fced840cb16c1e13aa9a  openssl-devel-0.9.7a-43.2.s390x.rpm
967c2c22cfc0549e768fb24760a83561  openssl-perl-0.9.7a-43.2.s390x.rpm
7c1d10a24e9f4a3443ade30b09560f44  openssl096b-0.9.6b-22.3.s390.rpm

x86_64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
a08f4a829f55b9410d392c660139a087  openssl-0.9.7a-43.2.x86_64.rpm
d788d0abc3990f22ee2a879f64c0f79f  openssl-devel-0.9.7a-43.2.x86_64.rpm
272c1d08b3f644e66165bd2aeb39798a  openssl-perl-0.9.7a-43.2.x86_64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
8200d3810815f04044a4660c6cd326f6  openssl096b-0.9.6b-22.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssl-0.9.7a-43.2.src.rpm
632bcfec21c365a0b85a9ede55eb5cf1  openssl-0.9.7a-43.2.src.rpm
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openssl096b-0.9.6b-22.3.src.rpm
d4d515e7811eb994384a7591fdba9e7f  openssl096b-0.9.6b-22.3.src.rpm

i386:
487ce4c45ebf66926274b1253a848cd4  openssl-0.9.7a-43.2.i386.rpm
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
8978b9729c1a20fd03e983114b130dd0  openssl-devel-0.9.7a-43.2.i386.rpm
3ca9137b86397258d518bdc259ac4b78  openssl-perl-0.9.7a-43.2.i386.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm

x86_64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
a08f4a829f55b9410d392c660139a087  openssl-0.9.7a-43.2.x86_64.rpm
d788d0abc3990f22ee2a879f64c0f79f  openssl-devel-0.9.7a-43.2.x86_64.rpm
272c1d08b3f644e66165bd2aeb39798a  openssl-perl-0.9.7a-43.2.x86_64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
8200d3810815f04044a4660c6cd326f6  openssl096b-0.9.6b-22.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssl-0.9.7a-43.2.src.rpm
632bcfec21c365a0b85a9ede55eb5cf1  openssl-0.9.7a-43.2.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openssl096b-0.9.6b-22.3.src.rpm
d4d515e7811eb994384a7591fdba9e7f  openssl096b-0.9.6b-22.3.src.rpm

i386:
487ce4c45ebf66926274b1253a848cd4  openssl-0.9.7a-43.2.i386.rpm
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
8978b9729c1a20fd03e983114b130dd0  openssl-devel-0.9.7a-43.2.i386.rpm
3ca9137b86397258d518bdc259ac4b78  openssl-perl-0.9.7a-43.2.i386.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm

ia64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
2982807a86a9014fc24244313fa94eab  openssl-0.9.7a-43.2.ia64.rpm
70bd62608e952f884fd5a28d19bd96a7  openssl-devel-0.9.7a-43.2.ia64.rpm
c7a9c09ff8873c7a64186f928b14baad  openssl-perl-0.9.7a-43.2.ia64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
9dd474ab5fd73f0a83a9b0d1953f5794  openssl096b-0.9.6b-22.3.ia64.rpm

x86_64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
a08f4a829f55b9410d392c660139a087  openssl-0.9.7a-43.2.x86_64.rpm
d788d0abc3990f22ee2a879f64c0f79f  openssl-devel-0.9.7a-43.2.x86_64.rpm
272c1d08b3f644e66165bd2aeb39798a  openssl-perl-0.9.7a-43.2.x86_64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
8200d3810815f04044a4660c6cd326f6  openssl096b-0.9.6b-22.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssl-0.9.7a-43.2.src.rpm
632bcfec21c365a0b85a9ede55eb5cf1  openssl-0.9.7a-43.2.src.rpm
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openssl096b-0.9.6b-22.3.src.rpm
d4d515e7811eb994384a7591fdba9e7f  openssl096b-0.9.6b-22.3.src.rpm

i386:
487ce4c45ebf66926274b1253a848cd4  openssl-0.9.7a-43.2.i386.rpm
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
8978b9729c1a20fd03e983114b130dd0  openssl-devel-0.9.7a-43.2.i386.rpm
3ca9137b86397258d518bdc259ac4b78  openssl-perl-0.9.7a-43.2.i386.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm

ia64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
2982807a86a9014fc24244313fa94eab  openssl-0.9.7a-43.2.ia64.rpm
70bd62608e952f884fd5a28d19bd96a7  openssl-devel-0.9.7a-43.2.ia64.rpm
c7a9c09ff8873c7a64186f928b14baad  openssl-perl-0.9.7a-43.2.ia64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
9dd474ab5fd73f0a83a9b0d1953f5794  openssl096b-0.9.6b-22.3.ia64.rpm

x86_64:
984d989808f91d1cc99643aebc3feddd  openssl-0.9.7a-43.2.i686.rpm
a08f4a829f55b9410d392c660139a087  openssl-0.9.7a-43.2.x86_64.rpm
d788d0abc3990f22ee2a879f64c0f79f  openssl-devel-0.9.7a-43.2.x86_64.rpm
272c1d08b3f644e66165bd2aeb39798a  openssl-perl-0.9.7a-43.2.x86_64.rpm
b6b2e4312f617df65e64c3ef900808eb  openssl096b-0.9.6b-22.3.i386.rpm
8200d3810815f04044a4660c6cd326f6  openssl096b-0.9.6b-22.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0109

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCnbphXlSAg2UNWIIRAuPkAJ9SH5Hgar+1ylBcpbtLfN4JDd2xQgCgviUd
ku7JNTOYm8ER2V+gCzDFKnM=
=fJhr
- -----END PGP SIGNATURE-----


- -- 
Enterprise-watch-list mailing list
Enterprise-watch-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/enterprise-watch-list




- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQp8N2Ypao72zK539AQEnxgQAl7bIXzkkMmYkt+owdpXBjGEmwrmo7/dW
b/ZNN2E5hywQ0dpk+C/bpS7aRtehGhDDmgipvCVJiwx3nGQGBrzZxpzsHaQ/rpcg
TNEjynccRr1pSlI8XrMHgLXZkvzyyH3cMu0NRqJX+84n4Xgeq38kTihOP+ZxhveP
JziFkYhRrLY=
=5Gye
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________