[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 435/05 - Red Hat - Four Security Advisories



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 435/05 dated 09.06.05  Time: 15:10  
  UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
Red Hat - Four Security Advisories:
     1.  Low: dbus security update [RHSA-2005:102-01]
     2.  Low: rsh security update  [RHSA-2005:165-01]
     3.  Moderate: xorg-x11 security update [RHSA-2005:198-01]
     4.  Updated kernel packages available for Red Hat Enterprise Linux 4 
         Update 1 [RHSA-2005:420-01]

Detail
====== 

Security advisory summaries:

     1.  A user can send and listen to messages on another user's per-user session bus 
         if they know the address of the socket.  Users of dbus are advised to upgrade 
         to these updated packages, which contain backported patches to correct this 
         issue.

     2.  The rcp protocol allows a server to instruct a client to write to arbitrary
         files outside of the current directory. This could potentially cause a
         security issue if a user uses rcp to copy files from a malicious server.

     3.  Since the initial release of Red Hat Enterprise Linux 4, a number of issues
         have been addressed in the X.Org X11 X Window System.  This erratum also
         updates X11R6.8 to the latest stable point release (6.8.2), which includes
         various stability and reliability fixes.

     4.  A flaw was discovered in the servicing of a raw device ioctl.  A local user
         who has access to raw devices could use this flaw to write to kernel memory
         and cause a denial of service or potentially gain privileges.  There were many 
         bug fixes in various parts of the kernel.  The ongoing effort to resolve these 
         problems has resulted in a marked improvement in the reliability and scalability 
         of Red Hat Enterprise Linux 4.


Security advisory content follows:


1.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: dbus security update.
Advisory ID:       RHSA-2005:102-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-102.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0201
- - ---------------------------------------------------------------------

1. Summary:

Updated dbus packages that fix a security issue are now available for
Red Hat Enterprise Linux 4.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

D-BUS is a system for sending messages between applications. It is
used both for the systemwide message bus service, and as a
per-user-login-session messaging facility.

Dan Reed discovered that a user can send and listen to messages on another
user's per-user session bus if they know the address of the socket. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0201 to this issue.  In Red Hat Enterprise Linux 4, the
per-user session bus is only used for printing notifications,  therefore
this issue would only allow a local user to examine or send additional
print notification messages.

Users of dbus are advised to upgrade to these updated packages,
which contain backported patches to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

146766 - CAN-2005-0201 dbus information leak


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/dbus-0.22-12.EL.2.src.rpm
537adec67677037eaf9acaa55b396928  dbus-0.22-12.EL.2.src.rpm

i386:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
db24da3fa2954c17567e91ae77776a0e  dbus-devel-0.22-12.EL.2.i386.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
8332d90997bbec3edf57330a4b5cf081  dbus-python-0.22-12.EL.2.i386.rpm
e9e4d40683926c6293ba3ff397130cc6  dbus-x11-0.22-12.EL.2.i386.rpm

ia64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
6ea8fa89d0181efd64cd6831a397ec76  dbus-0.22-12.EL.2.ia64.rpm
40913e5f8543c76ef64ea53d05a7bccc  dbus-devel-0.22-12.EL.2.ia64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
e2de096c0739747f8a35ffd5d7714f8d  dbus-glib-0.22-12.EL.2.ia64.rpm
bd3a1bb1d3c7d6eabff84fe53f2bde71  dbus-python-0.22-12.EL.2.ia64.rpm
cde66fb269cb0b9b1853bf4f3591bddb  dbus-x11-0.22-12.EL.2.ia64.rpm

ppc:
53fcf4cab57ac441cc93632f0e226f46  dbus-0.22-12.EL.2.ppc.rpm
7d12c812849775e0527b0e4db1e61708  dbus-0.22-12.EL.2.ppc64.rpm
e9dce9977790959d81de62d4db6d08d8  dbus-devel-0.22-12.EL.2.ppc.rpm
c45001a18409a92c52f52635e6e8cbb4  dbus-glib-0.22-12.EL.2.ppc.rpm
a728e0bde51ad5a5e4cab02b79300669  dbus-glib-0.22-12.EL.2.ppc64.rpm
e47c8e7145f91eccabb3087a6601d37b  dbus-python-0.22-12.EL.2.ppc.rpm
541c5238507b667de8c82278fb1a7d62  dbus-x11-0.22-12.EL.2.ppc.rpm

s390:
4f21f160fb3fb80d07ceee927c2a64db  dbus-0.22-12.EL.2.s390.rpm
90f7505b954f71fffdbfd78360029a6f  dbus-devel-0.22-12.EL.2.s390.rpm
dc3e6ed955ccf6a4c97eb74e152f3e63  dbus-glib-0.22-12.EL.2.s390.rpm
a275121d8250e98c6afde683ae1d0e56  dbus-python-0.22-12.EL.2.s390.rpm
6ec4f7e99ffcaf0a3ee4f44286dc1f82  dbus-x11-0.22-12.EL.2.s390.rpm

s390x:
4f21f160fb3fb80d07ceee927c2a64db  dbus-0.22-12.EL.2.s390.rpm
70b9778d6ab98482d0e8c929756893bb  dbus-0.22-12.EL.2.s390x.rpm
3c51e6b692ef85cd696c42ec938a2e28  dbus-devel-0.22-12.EL.2.s390x.rpm
dc3e6ed955ccf6a4c97eb74e152f3e63  dbus-glib-0.22-12.EL.2.s390.rpm
037b6f34e2e4c238a383120165e45d46  dbus-glib-0.22-12.EL.2.s390x.rpm
02e6d13bfa8bfa89b64cb97f4841dbb8  dbus-python-0.22-12.EL.2.s390x.rpm
3a114f876a32ce244ffffc83ce4b2352  dbus-x11-0.22-12.EL.2.s390x.rpm

x86_64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
da338197be57085ac50bea095093e9c8  dbus-0.22-12.EL.2.x86_64.rpm
7317ef4136b43a67a5b3b7c7b4c371aa  dbus-devel-0.22-12.EL.2.x86_64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
2eaed85d593d0c48878c625aff0a9b6e  dbus-glib-0.22-12.EL.2.x86_64.rpm
590ff55a3a64ae1d7ba11f6e437a444e  dbus-python-0.22-12.EL.2.x86_64.rpm
d339d348abad3effab5489facb6292d4  dbus-x11-0.22-12.EL.2.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/dbus-0.22-12.EL.2.src.rpm
537adec67677037eaf9acaa55b396928  dbus-0.22-12.EL.2.src.rpm

i386:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
db24da3fa2954c17567e91ae77776a0e  dbus-devel-0.22-12.EL.2.i386.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
8332d90997bbec3edf57330a4b5cf081  dbus-python-0.22-12.EL.2.i386.rpm
e9e4d40683926c6293ba3ff397130cc6  dbus-x11-0.22-12.EL.2.i386.rpm

x86_64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
da338197be57085ac50bea095093e9c8  dbus-0.22-12.EL.2.x86_64.rpm
7317ef4136b43a67a5b3b7c7b4c371aa  dbus-devel-0.22-12.EL.2.x86_64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
2eaed85d593d0c48878c625aff0a9b6e  dbus-glib-0.22-12.EL.2.x86_64.rpm
590ff55a3a64ae1d7ba11f6e437a444e  dbus-python-0.22-12.EL.2.x86_64.rpm
d339d348abad3effab5489facb6292d4  dbus-x11-0.22-12.EL.2.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/dbus-0.22-12.EL.2.src.rpm
537adec67677037eaf9acaa55b396928  dbus-0.22-12.EL.2.src.rpm

i386:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
db24da3fa2954c17567e91ae77776a0e  dbus-devel-0.22-12.EL.2.i386.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
8332d90997bbec3edf57330a4b5cf081  dbus-python-0.22-12.EL.2.i386.rpm
e9e4d40683926c6293ba3ff397130cc6  dbus-x11-0.22-12.EL.2.i386.rpm

ia64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
6ea8fa89d0181efd64cd6831a397ec76  dbus-0.22-12.EL.2.ia64.rpm
40913e5f8543c76ef64ea53d05a7bccc  dbus-devel-0.22-12.EL.2.ia64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
e2de096c0739747f8a35ffd5d7714f8d  dbus-glib-0.22-12.EL.2.ia64.rpm
bd3a1bb1d3c7d6eabff84fe53f2bde71  dbus-python-0.22-12.EL.2.ia64.rpm
cde66fb269cb0b9b1853bf4f3591bddb  dbus-x11-0.22-12.EL.2.ia64.rpm

x86_64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
da338197be57085ac50bea095093e9c8  dbus-0.22-12.EL.2.x86_64.rpm
7317ef4136b43a67a5b3b7c7b4c371aa  dbus-devel-0.22-12.EL.2.x86_64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
2eaed85d593d0c48878c625aff0a9b6e  dbus-glib-0.22-12.EL.2.x86_64.rpm
590ff55a3a64ae1d7ba11f6e437a444e  dbus-python-0.22-12.EL.2.x86_64.rpm
d339d348abad3effab5489facb6292d4  dbus-x11-0.22-12.EL.2.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/dbus-0.22-12.EL.2.src.rpm
537adec67677037eaf9acaa55b396928  dbus-0.22-12.EL.2.src.rpm

i386:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
db24da3fa2954c17567e91ae77776a0e  dbus-devel-0.22-12.EL.2.i386.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
8332d90997bbec3edf57330a4b5cf081  dbus-python-0.22-12.EL.2.i386.rpm
e9e4d40683926c6293ba3ff397130cc6  dbus-x11-0.22-12.EL.2.i386.rpm

ia64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
6ea8fa89d0181efd64cd6831a397ec76  dbus-0.22-12.EL.2.ia64.rpm
40913e5f8543c76ef64ea53d05a7bccc  dbus-devel-0.22-12.EL.2.ia64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
e2de096c0739747f8a35ffd5d7714f8d  dbus-glib-0.22-12.EL.2.ia64.rpm
bd3a1bb1d3c7d6eabff84fe53f2bde71  dbus-python-0.22-12.EL.2.ia64.rpm
cde66fb269cb0b9b1853bf4f3591bddb  dbus-x11-0.22-12.EL.2.ia64.rpm

x86_64:
de0a552c5ad910d6768e819b32a02a84  dbus-0.22-12.EL.2.i386.rpm
da338197be57085ac50bea095093e9c8  dbus-0.22-12.EL.2.x86_64.rpm
7317ef4136b43a67a5b3b7c7b4c371aa  dbus-devel-0.22-12.EL.2.x86_64.rpm
a307b6498a5b61e9550d3dbb6d253e4a  dbus-glib-0.22-12.EL.2.i386.rpm
2eaed85d593d0c48878c625aff0a9b6e  dbus-glib-0.22-12.EL.2.x86_64.rpm
590ff55a3a64ae1d7ba11f6e437a444e  dbus-python-0.22-12.EL.2.x86_64.rpm
d339d348abad3effab5489facb6292d4  dbus-x11-0.22-12.EL.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0201

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCpxCQXlSAg2UNWIIRAu09AJ4uH49k2pBNZpQZmf4b2+ZF7U6pLwCeLZKn
EsnsQsm9lvswaFgn4e4aFo4=
=sFbh
- -----END PGP SIGNATURE-----




2.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: rsh security update
Advisory ID:       RHSA-2005:165-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-165.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0175
- - ---------------------------------------------------------------------

1. Summary:

Updated rsh packages that fix various bugs and a theoretical security issue
are now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The rsh package contains a set of programs that allow users to run
commands on remote machines, login to other machines, and copy files
between machines, using the rsh, rlogin, and rcp commands. All three of
these commands use rhosts-style authentication.

The rcp protocol allows a server to instruct a client to write to arbitrary
files outside of the current directory. This could potentially cause a
security issue if a user uses rcp to copy files from a malicious server.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0175 to this issue.

These updated packages also address the following bugs:

The rlogind server reported "SIGCHLD set to SIG_IGN but calls wait()"
message to the system log because the original BSD code was ported
incorrectly to linux.

The rexecd server did not function on systems where client hostnames were
not in the DNS service, because server code called gethostbyaddr() for each
new connection.

The rcp command incorrectly used the "errno" variable and produced
erroneous error messages.

The rexecd command ignored settings in the /etc/security/limits file,
because the PAM session was incorrectly initialized.

All users of rsh should upgrade to these updated packages, which resolve
these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/):

146978 - RHEL4: rexecd does not set limits on /etc/security/limits
146979 - RHEL4: rcp gives incorrect error report when file system writes fai


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/rsh-0.17-25.3.src.rpm
cd810d79ebe62b9dd73ccfcd9a82ba42  rsh-0.17-25.3.src.rpm

i386:
e0b1f41ff4027f07e56c6c3a815beac5  rsh-0.17-25.3.i386.rpm
119de22692c472215c0bd5abd4ad437a  rsh-server-0.17-25.3.i386.rpm

ia64:
85191a2e9573743b281dd62446bf4dcc  rsh-0.17-25.3.ia64.rpm
44f1d4d7955056579b16a1f29b93652c  rsh-server-0.17-25.3.ia64.rpm

ppc:
6f70af890d4f627898554f46e9b642e9  rsh-0.17-25.3.ppc.rpm
c079a7a6384240c8d9f08e9bdbdd6311  rsh-server-0.17-25.3.ppc.rpm

s390:
8c6ce8d07095d070a0b8caa7eaecb418  rsh-0.17-25.3.s390.rpm
df47c3a52b2fb41a9bfc34b603078c21  rsh-server-0.17-25.3.s390.rpm

s390x:
b409a5341be41047d537d61e49066895  rsh-0.17-25.3.s390x.rpm
af94e8b18e8e3c2c4f7d116ac0ff27cc  rsh-server-0.17-25.3.s390x.rpm

x86_64:
fdb219bb4f76ef3add60d5dda6e583d4  rsh-0.17-25.3.x86_64.rpm
ae5b1069589042712574a22b67a4d888  rsh-server-0.17-25.3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/rsh-0.17-25.3.src.rpm
cd810d79ebe62b9dd73ccfcd9a82ba42  rsh-0.17-25.3.src.rpm

i386:
e0b1f41ff4027f07e56c6c3a815beac5  rsh-0.17-25.3.i386.rpm
119de22692c472215c0bd5abd4ad437a  rsh-server-0.17-25.3.i386.rpm

x86_64:
fdb219bb4f76ef3add60d5dda6e583d4  rsh-0.17-25.3.x86_64.rpm
ae5b1069589042712574a22b67a4d888  rsh-server-0.17-25.3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/rsh-0.17-25.3.src.rpm
cd810d79ebe62b9dd73ccfcd9a82ba42  rsh-0.17-25.3.src.rpm

i386:
e0b1f41ff4027f07e56c6c3a815beac5  rsh-0.17-25.3.i386.rpm
119de22692c472215c0bd5abd4ad437a  rsh-server-0.17-25.3.i386.rpm

ia64:
85191a2e9573743b281dd62446bf4dcc  rsh-0.17-25.3.ia64.rpm
44f1d4d7955056579b16a1f29b93652c  rsh-server-0.17-25.3.ia64.rpm

x86_64:
fdb219bb4f76ef3add60d5dda6e583d4  rsh-0.17-25.3.x86_64.rpm
ae5b1069589042712574a22b67a4d888  rsh-server-0.17-25.3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/rsh-0.17-25.3.src.rpm
cd810d79ebe62b9dd73ccfcd9a82ba42  rsh-0.17-25.3.src.rpm

i386:
e0b1f41ff4027f07e56c6c3a815beac5  rsh-0.17-25.3.i386.rpm
119de22692c472215c0bd5abd4ad437a  rsh-server-0.17-25.3.i386.rpm

ia64:
85191a2e9573743b281dd62446bf4dcc  rsh-0.17-25.3.ia64.rpm
44f1d4d7955056579b16a1f29b93652c  rsh-server-0.17-25.3.ia64.rpm

x86_64:
fdb219bb4f76ef3add60d5dda6e583d4  rsh-0.17-25.3.x86_64.rpm
ae5b1069589042712574a22b67a4d888  rsh-server-0.17-25.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0175

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCpxCzXlSAg2UNWIIRAopwAKC0YAHlh2GzTGPCxKMvUHUzP5GL2ACfbsT4
a+9joNlbdbgKbi/pmtib6Eo=
=RLxb
- -----END PGP SIGNATURE-----




3.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: xorg-x11 security update
Advisory ID:       RHSA-2005:198-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-198.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0605
- - ---------------------------------------------------------------------

1. Summary:

Updated xorg-x11 packages that fix a security issue as well as various bugs
are now available for Red Hat Enterprise Linux 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

X.Org X11 is the X Window System which provides the core functionality
of the Linux GUI desktop.

An integer overflow flaw was found in libXpm, which is used by some
applications for loading of XPM images. An attacker could create a
carefully crafted XPM file in such a way that it could cause an application
linked with libXpm to execute arbitrary code when the file was opened by a
victim. The Common Vulnerabilities and Exposures project  (cve.mitre.org)
has assigned the name CAN-2005-0605 to this issue. 

Since the initial release of Red Hat Enterprise Linux 4, a number of issues
have been addressed in the X.Org X11 X Window System.  This erratum also
updates X11R6.8 to the latest stable point release (6.8.2), which includes
various stability and reliability fixes including (but not limited to) the
following:

- - - The 'radeon' driver has been modified to disable "RENDER" acceleration
  by default, due to a bug in the implementation which has not yet
  been isolated.  This can be manually re-enabled by using the
  following option in the device section of the X server config file:

    Option "RenderAccel"

- - - The 'vmware' video driver is now available on 64-bit AMD64 and
  compatible systems.

- - - The Intel 'i810' video driver is now available on 64-bit EM64T
  systems.

- - - Stability fixes in the X Server's PCI handling layer for 64-bit systems,
  which resolve some issues reported by "vesa" and "nv" driver users.

- - - Support for Hewlett Packard's Itanium ZX2 chipset.

- - - Nvidia "nv" video driver update provides support for some of
  the newer Nvidia chipsets, as well as many stability and reliability
  fixes.

- - - Intel i810 video driver stability update, which fixes the widely
  reported i810/i815 screen refresh issues many have experienced.

- - - Packaging fixes for multilib systems, which permit both 32-bit
  and 64-bit X11 development environments to be simultaneously installed
  without file conflicts.

In addition to the above highlights, the X.Org X11 6.8.2 release has a
large number of additional stability fixes which resolve various other
issues reported since the initial release of Red Hat Enterprise Linux 4. 

All users of X11 should upgrade to these updated packages, which resolve
these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

136941 - font corruption on openoffice.org menus
143910 - X is unusable on GeForce 6600GT with nForce4
150036 - CAN-2005-0605 XPM buffer overflow
157962 - xorg-x11-6.8.1-23 missing half of Lucida fonts


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/fonts-xorg-6.8.1.1-1.EL.1.src.rpm
d302e5b21428558a5954f611390370ef  fonts-xorg-6.8.1.1-1.EL.1.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.6.src.rpm
2dba3dbe86e2a5af412b04df4517feb5  xorg-x11-6.8.2-1.EL.13.6.src.rpm

i386:
929e3eed6d26851a9d54a37233bbc27a  xorg-x11-6.8.2-1.EL.13.6.i386.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
1398297f8b44a8c4e4122deb1ae771af  xorg-x11-Xdmx-6.8.2-1.EL.13.6.i386.rpm
a20d1ba0cf7250107d8efb3732d6e2a2  xorg-x11-Xnest-6.8.2-1.EL.13.6.i386.rpm
ad10533df90db4a3e0979d2fedf7442f  xorg-x11-Xvfb-6.8.2-1.EL.13.6.i386.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
659022a4612999b92f3ba9cba20e9e45  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.i386.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
e8e824b5347847c659bb619ed314e3a2  xorg-x11-doc-6.8.2-1.EL.13.6.i386.rpm
878dfb417f0d4b5e83c1ad52ff0b95c7  xorg-x11-font-utils-6.8.2-1.EL.13.6.i386.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
d27848037b05c9617df85ec1cbea8a0a  xorg-x11-sdk-6.8.2-1.EL.13.6.i386.rpm
ddb4636146713713c515e3adf3dedbb6  xorg-x11-tools-6.8.2-1.EL.13.6.i386.rpm
9b0db26123bdbd93e68b26a48070dc91  xorg-x11-twm-6.8.2-1.EL.13.6.i386.rpm
1d243d49b11097f19bc4b8024116d768  xorg-x11-xauth-6.8.2-1.EL.13.6.i386.rpm
28071508ebae9a7199e18d39b8c0a0da  xorg-x11-xdm-6.8.2-1.EL.13.6.i386.rpm
87f823b62cc8d14ba7e210ecc5128239  xorg-x11-xfs-6.8.2-1.EL.13.6.i386.rpm

ia64:
47311d507127140fa7b8834253c92504  xorg-x11-6.8.2-1.EL.13.6.ia64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
63b77466005af3adab8a70553f9af76d  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.ia64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
add55b457c1586513ce4da878414facb  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.ia64.rpm
1f4d00f14fe8b054077b2e47013ac91c  xorg-x11-Xdmx-6.8.2-1.EL.13.6.ia64.rpm
32d44ba2debb44f7347168588e993341  xorg-x11-Xnest-6.8.2-1.EL.13.6.ia64.rpm
6ef27ddb05bd9e35ee58467a0b5536a0  xorg-x11-Xvfb-6.8.2-1.EL.13.6.ia64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
66782152068d7fa5bb087e4c74015b2b  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.ia64.rpm
c84efd56af00b752bfc99a703c7675eb  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.ia64.rpm
1b5dc63a7f68d8f02b9c0356eb3b7699  xorg-x11-devel-6.8.2-1.EL.13.6.ia64.rpm
e9b77bacfd93d7fc9e8351a34c5549f4  xorg-x11-doc-6.8.2-1.EL.13.6.ia64.rpm
acfeafe21d383d161217e79dbb1ce2b0  xorg-x11-font-utils-6.8.2-1.EL.13.6.ia64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
81bbe494292f140e131b369f6f0e856c  xorg-x11-libs-6.8.2-1.EL.13.6.ia64.rpm
3545cfd3ea100e24489a5a2eb3441ed1  xorg-x11-sdk-6.8.2-1.EL.13.6.ia64.rpm
dd76d64850fdd1cf1e48c229d3e6cdc2  xorg-x11-tools-6.8.2-1.EL.13.6.ia64.rpm
6711dd7324215cfd204a881d66aae71e  xorg-x11-twm-6.8.2-1.EL.13.6.ia64.rpm
2938ad6054837b6ea74b505bc9bc3dad  xorg-x11-xauth-6.8.2-1.EL.13.6.ia64.rpm
4a590403f973be5dcd50351f2d2cbfb0  xorg-x11-xdm-6.8.2-1.EL.13.6.ia64.rpm
0ad142870d28728c614332cdd9e7e095  xorg-x11-xfs-6.8.2-1.EL.13.6.ia64.rpm

noarch:
dd704e58721845f2a1acda4e04564ef6  fonts-xorg-100dpi-6.8.1.1-1.EL.1.noarch.rpm
42fa5b7ed066290417f5898779048490  fonts-xorg-75dpi-6.8.1.1-1.EL.1.noarch.rpm
ce95e5f4b909f42222ab409ed76620d8  fonts-xorg-ISO8859-14-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c852bc8ee37e53cc0a9a73bd70a1b270  fonts-xorg-ISO8859-14-75dpi-6.8.1.1-1.EL.1.noarch.rpm
a5b24d88e1003b482499bfa96d25d928  fonts-xorg-ISO8859-15-100dpi-6.8.1.1-1.EL.1.noarch.rpm
71124cb7237dd199178543e665f52a7c  fonts-xorg-ISO8859-15-75dpi-6.8.1.1-1.EL.1.noarch.rpm
0a0397c7fa7cf49cf7f13c836cf16966  fonts-xorg-ISO8859-2-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c86ed69319ad29efb3341602beca7502  fonts-xorg-ISO8859-2-75dpi-6.8.1.1-1.EL.1.noarch.rpm
929d259a1dd23a32300d0723ddcf59ac  fonts-xorg-ISO8859-9-100dpi-6.8.1.1-1.EL.1.noarch.rpm
b7617d7d6a4043f54be749edee492f0f  fonts-xorg-ISO8859-9-75dpi-6.8.1.1-1.EL.1.noarch.rpm
b1c6a8bc4b7954f4287f1cf98d69b7ee  fonts-xorg-base-6.8.1.1-1.EL.1.noarch.rpm
7895c40fd271833f95a5135d13ec7424  fonts-xorg-cyrillic-6.8.1.1-1.EL.1.noarch.rpm
9b61b5e9f8c0c45d735516e7b9af3199  fonts-xorg-syriac-6.8.1.1-1.EL.1.noarch.rpm
ba92067475164be276245d18b1df9ab1  fonts-xorg-truetype-6.8.1.1-1.EL.1.noarch.rpm

ppc:
0e53bfd5c96d43faff5c811b0d8a9766  xorg-x11-6.8.2-1.EL.13.6.ppc.rpm
1f2075ad59cd606cf50c240e96aa2651  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.ppc.rpm
fd527c81a86264b9c900d98d4d3bdebe  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.ppc64.rpm
dae5fbc862b77f4ed7bc077458256df1  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.ppc.rpm
e2f1007e956b6141d24216d52cf4457c  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.ppc64.rpm
21bf078f64d07094bd67e76fc179f6e4  xorg-x11-Xdmx-6.8.2-1.EL.13.6.ppc.rpm
711aa78e95b99474a5809f8dd446c777  xorg-x11-Xnest-6.8.2-1.EL.13.6.ppc.rpm
edc15bdef078d509fe0412f5f4749b91  xorg-x11-Xvfb-6.8.2-1.EL.13.6.ppc.rpm
9182b3d0a79d7061385eadac1cd73b4a  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.ppc.rpm
f190cd19022b9c27faacc8fce664af84  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.ppc64.rpm
2d19ff3ae946ccbec8588452de7a4cfd  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.ppc.rpm
235dd79c99e4b78e1e72ea9703a614af  xorg-x11-devel-6.8.2-1.EL.13.6.ppc.rpm
4734d32c610fd5692e3ca71568425f8a  xorg-x11-devel-6.8.2-1.EL.13.6.ppc64.rpm
2d047be5b23a14d36d43988e8ed6d5d2  xorg-x11-doc-6.8.2-1.EL.13.6.ppc.rpm
939f18e6233e3852b4385589dd55e68f  xorg-x11-font-utils-6.8.2-1.EL.13.6.ppc.rpm
e417ccdb4b8707fa22bc015f9a107820  xorg-x11-libs-6.8.2-1.EL.13.6.ppc.rpm
ba11fd2c35871977397eda9fa1e7518c  xorg-x11-libs-6.8.2-1.EL.13.6.ppc64.rpm
1b9dd05cd5dcae55aed4dd52ee4358bb  xorg-x11-sdk-6.8.2-1.EL.13.6.ppc.rpm
21158f900f08b464e01a3f3a959fc38e  xorg-x11-tools-6.8.2-1.EL.13.6.ppc.rpm
a57b4a1a42a809ea09979a933234a362  xorg-x11-twm-6.8.2-1.EL.13.6.ppc.rpm
ccbd94e93083bdf12f844f31829e0aaa  xorg-x11-xauth-6.8.2-1.EL.13.6.ppc.rpm
48476c36f730d4e39c2897a65aa22d87  xorg-x11-xdm-6.8.2-1.EL.13.6.ppc.rpm
3aa4a6092522b1cd8494409cfaf1905c  xorg-x11-xfs-6.8.2-1.EL.13.6.ppc.rpm

s390:
90d3f9796159b24eb6522b0bfecd7935  xorg-x11-6.8.2-1.EL.13.6.s390.rpm
2e45fa3d19fddb1a501cb9cbc0acef73  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.s390.rpm
fc38b410bfc94d7bf8b0d9fa08b5a9e0  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.s390.rpm
a974988042d07fa4135ee4082bfed24a  xorg-x11-Xdmx-6.8.2-1.EL.13.6.s390.rpm
34ef2d430d66639d33b5c74dfa40a701  xorg-x11-Xnest-6.8.2-1.EL.13.6.s390.rpm
c56bd55e153213a61d32923296bd2a6c  xorg-x11-Xvfb-6.8.2-1.EL.13.6.s390.rpm
70efb629d46d14af7f1706003acfc9dd  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.s390.rpm
987be472fbd22a8d4e5814f97a32b7aa  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.s390.rpm
c2199e09a82f61b3d5a5d3a5718496af  xorg-x11-devel-6.8.2-1.EL.13.6.s390.rpm
42c4188bd28ee5d62c4a588105e754b3  xorg-x11-font-utils-6.8.2-1.EL.13.6.s390.rpm
d68c15a8bc62742b08f42dd489f381aa  xorg-x11-libs-6.8.2-1.EL.13.6.s390.rpm
83224e626f316c40dbfd0392eb9a8dd2  xorg-x11-tools-6.8.2-1.EL.13.6.s390.rpm
cda4ebf687874b2abca6f78aadc6ef7a  xorg-x11-twm-6.8.2-1.EL.13.6.s390.rpm
50f759ee213cf50f7bd0d1c149271b9a  xorg-x11-xauth-6.8.2-1.EL.13.6.s390.rpm
ef9d886511da1c758696d5b7992fd342  xorg-x11-xdm-6.8.2-1.EL.13.6.s390.rpm
56410b90c92765b943cf753b433e6d37  xorg-x11-xfs-6.8.2-1.EL.13.6.s390.rpm

s390x:
600170356c8a8d1cae8167499b4e6e49  xorg-x11-6.8.2-1.EL.13.6.s390x.rpm
2e45fa3d19fddb1a501cb9cbc0acef73  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.s390.rpm
06b3917d2811c261c505a3377b0eaf92  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.s390x.rpm
fc38b410bfc94d7bf8b0d9fa08b5a9e0  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.s390.rpm
6442565debb1247f0f11aa26c0ff58b6  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.s390x.rpm
edad98338ef503de12e9cf512b10ec3e  xorg-x11-Xdmx-6.8.2-1.EL.13.6.s390x.rpm
ccc5064cbecab88135dedd6558d0686a  xorg-x11-Xnest-6.8.2-1.EL.13.6.s390x.rpm
6d1908e74635db6820b0d51ee99ecf85  xorg-x11-Xvfb-6.8.2-1.EL.13.6.s390x.rpm
70efb629d46d14af7f1706003acfc9dd  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.s390.rpm
166b7f53bdf1f96bd3f707627f144376  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.s390x.rpm
de817f2023ab8afd98d17ccad8ceef88  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.s390x.rpm
c2199e09a82f61b3d5a5d3a5718496af  xorg-x11-devel-6.8.2-1.EL.13.6.s390.rpm
8bb26b4aa665b6c3c358699c55c15213  xorg-x11-devel-6.8.2-1.EL.13.6.s390x.rpm
a632fc929437b77fce6add54e605e1ec  xorg-x11-font-utils-6.8.2-1.EL.13.6.s390x.rpm
d68c15a8bc62742b08f42dd489f381aa  xorg-x11-libs-6.8.2-1.EL.13.6.s390.rpm
3ac9d273edc6975e78d143d57239191d  xorg-x11-libs-6.8.2-1.EL.13.6.s390x.rpm
08f3a8fa7878d927a7d9876666ff568b  xorg-x11-tools-6.8.2-1.EL.13.6.s390x.rpm
e553327e2f90764788f94db9c7989946  xorg-x11-twm-6.8.2-1.EL.13.6.s390x.rpm
4e46ddd290043e11b9556b3dedd064e3  xorg-x11-xauth-6.8.2-1.EL.13.6.s390x.rpm
f17a0a5381efec762b0cc4d8efe498e7  xorg-x11-xdm-6.8.2-1.EL.13.6.s390x.rpm
dd6fca7b7be84390b9a0f8476d5f5450  xorg-x11-xfs-6.8.2-1.EL.13.6.s390x.rpm

x86_64:
7eac765bcadc655a71bbbc26602f9c80  xorg-x11-6.8.2-1.EL.13.6.x86_64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
17991a3fb674b998dde4b118e35f7d97  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.x86_64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
decfa448f5036c287d6e38e633c1c361  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.x86_64.rpm
002e2bcb042f8547cdffcd9aff2e7259  xorg-x11-Xdmx-6.8.2-1.EL.13.6.x86_64.rpm
9f82fbdc5686f0e153411fe56cb134c9  xorg-x11-Xnest-6.8.2-1.EL.13.6.x86_64.rpm
8667a2f6b976b3dd1962b317954ecd2c  xorg-x11-Xvfb-6.8.2-1.EL.13.6.x86_64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
326b60e5e1ff0c23b54bfcce4cd322ba  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.x86_64.rpm
3d178960f317e479642063e9ca7dc62b  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.x86_64.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
537d92cdd68176f3c501c215a610e875  xorg-x11-devel-6.8.2-1.EL.13.6.x86_64.rpm
5f6a4e9550260ba78c5a443d1fb24327  xorg-x11-doc-6.8.2-1.EL.13.6.x86_64.rpm
2b0fde296d39d5673e48f3e83d2b979d  xorg-x11-font-utils-6.8.2-1.EL.13.6.x86_64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
360ef0284fc8d6cbd4984c307a646b5c  xorg-x11-libs-6.8.2-1.EL.13.6.x86_64.rpm
443f434466e26ca22ecbf81b9c7c971f  xorg-x11-sdk-6.8.2-1.EL.13.6.x86_64.rpm
a318653f42be707e471619439d6f7477  xorg-x11-tools-6.8.2-1.EL.13.6.x86_64.rpm
ee6641809aaf841f978cd6e2bda4e36c  xorg-x11-twm-6.8.2-1.EL.13.6.x86_64.rpm
a807c44b9042a98ab6bb139e155c9879  xorg-x11-xauth-6.8.2-1.EL.13.6.x86_64.rpm
ec80175b0d439abdd33aa14772c9195f  xorg-x11-xdm-6.8.2-1.EL.13.6.x86_64.rpm
21f10a089d4eddb5482e4c590b376cf5  xorg-x11-xfs-6.8.2-1.EL.13.6.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/fonts-xorg-6.8.1.1-1.EL.1.src.rpm
d302e5b21428558a5954f611390370ef  fonts-xorg-6.8.1.1-1.EL.1.src.rpm
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.6.src.rpm
2dba3dbe86e2a5af412b04df4517feb5  xorg-x11-6.8.2-1.EL.13.6.src.rpm

i386:
929e3eed6d26851a9d54a37233bbc27a  xorg-x11-6.8.2-1.EL.13.6.i386.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
1398297f8b44a8c4e4122deb1ae771af  xorg-x11-Xdmx-6.8.2-1.EL.13.6.i386.rpm
a20d1ba0cf7250107d8efb3732d6e2a2  xorg-x11-Xnest-6.8.2-1.EL.13.6.i386.rpm
ad10533df90db4a3e0979d2fedf7442f  xorg-x11-Xvfb-6.8.2-1.EL.13.6.i386.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
659022a4612999b92f3ba9cba20e9e45  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.i386.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
e8e824b5347847c659bb619ed314e3a2  xorg-x11-doc-6.8.2-1.EL.13.6.i386.rpm
878dfb417f0d4b5e83c1ad52ff0b95c7  xorg-x11-font-utils-6.8.2-1.EL.13.6.i386.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
d27848037b05c9617df85ec1cbea8a0a  xorg-x11-sdk-6.8.2-1.EL.13.6.i386.rpm
ddb4636146713713c515e3adf3dedbb6  xorg-x11-tools-6.8.2-1.EL.13.6.i386.rpm
9b0db26123bdbd93e68b26a48070dc91  xorg-x11-twm-6.8.2-1.EL.13.6.i386.rpm
1d243d49b11097f19bc4b8024116d768  xorg-x11-xauth-6.8.2-1.EL.13.6.i386.rpm
28071508ebae9a7199e18d39b8c0a0da  xorg-x11-xdm-6.8.2-1.EL.13.6.i386.rpm
87f823b62cc8d14ba7e210ecc5128239  xorg-x11-xfs-6.8.2-1.EL.13.6.i386.rpm

noarch:
dd704e58721845f2a1acda4e04564ef6  fonts-xorg-100dpi-6.8.1.1-1.EL.1.noarch.rpm
42fa5b7ed066290417f5898779048490  fonts-xorg-75dpi-6.8.1.1-1.EL.1.noarch.rpm
ce95e5f4b909f42222ab409ed76620d8  fonts-xorg-ISO8859-14-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c852bc8ee37e53cc0a9a73bd70a1b270  fonts-xorg-ISO8859-14-75dpi-6.8.1.1-1.EL.1.noarch.rpm
a5b24d88e1003b482499bfa96d25d928  fonts-xorg-ISO8859-15-100dpi-6.8.1.1-1.EL.1.noarch.rpm
71124cb7237dd199178543e665f52a7c  fonts-xorg-ISO8859-15-75dpi-6.8.1.1-1.EL.1.noarch.rpm
0a0397c7fa7cf49cf7f13c836cf16966  fonts-xorg-ISO8859-2-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c86ed69319ad29efb3341602beca7502  fonts-xorg-ISO8859-2-75dpi-6.8.1.1-1.EL.1.noarch.rpm
929d259a1dd23a32300d0723ddcf59ac  fonts-xorg-ISO8859-9-100dpi-6.8.1.1-1.EL.1.noarch.rpm
b7617d7d6a4043f54be749edee492f0f  fonts-xorg-ISO8859-9-75dpi-6.8.1.1-1.EL.1.noarch.rpm
b1c6a8bc4b7954f4287f1cf98d69b7ee  fonts-xorg-base-6.8.1.1-1.EL.1.noarch.rpm
7895c40fd271833f95a5135d13ec7424  fonts-xorg-cyrillic-6.8.1.1-1.EL.1.noarch.rpm
9b61b5e9f8c0c45d735516e7b9af3199  fonts-xorg-syriac-6.8.1.1-1.EL.1.noarch.rpm
ba92067475164be276245d18b1df9ab1  fonts-xorg-truetype-6.8.1.1-1.EL.1.noarch.rpm

x86_64:
7eac765bcadc655a71bbbc26602f9c80  xorg-x11-6.8.2-1.EL.13.6.x86_64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
17991a3fb674b998dde4b118e35f7d97  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.x86_64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
decfa448f5036c287d6e38e633c1c361  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.x86_64.rpm
002e2bcb042f8547cdffcd9aff2e7259  xorg-x11-Xdmx-6.8.2-1.EL.13.6.x86_64.rpm
9f82fbdc5686f0e153411fe56cb134c9  xorg-x11-Xnest-6.8.2-1.EL.13.6.x86_64.rpm
8667a2f6b976b3dd1962b317954ecd2c  xorg-x11-Xvfb-6.8.2-1.EL.13.6.x86_64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
326b60e5e1ff0c23b54bfcce4cd322ba  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.x86_64.rpm
3d178960f317e479642063e9ca7dc62b  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.x86_64.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
537d92cdd68176f3c501c215a610e875  xorg-x11-devel-6.8.2-1.EL.13.6.x86_64.rpm
5f6a4e9550260ba78c5a443d1fb24327  xorg-x11-doc-6.8.2-1.EL.13.6.x86_64.rpm
2b0fde296d39d5673e48f3e83d2b979d  xorg-x11-font-utils-6.8.2-1.EL.13.6.x86_64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
360ef0284fc8d6cbd4984c307a646b5c  xorg-x11-libs-6.8.2-1.EL.13.6.x86_64.rpm
443f434466e26ca22ecbf81b9c7c971f  xorg-x11-sdk-6.8.2-1.EL.13.6.x86_64.rpm
a318653f42be707e471619439d6f7477  xorg-x11-tools-6.8.2-1.EL.13.6.x86_64.rpm
ee6641809aaf841f978cd6e2bda4e36c  xorg-x11-twm-6.8.2-1.EL.13.6.x86_64.rpm
a807c44b9042a98ab6bb139e155c9879  xorg-x11-xauth-6.8.2-1.EL.13.6.x86_64.rpm
ec80175b0d439abdd33aa14772c9195f  xorg-x11-xdm-6.8.2-1.EL.13.6.x86_64.rpm
21f10a089d4eddb5482e4c590b376cf5  xorg-x11-xfs-6.8.2-1.EL.13.6.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/fonts-xorg-6.8.1.1-1.EL.1.src.rpm
d302e5b21428558a5954f611390370ef  fonts-xorg-6.8.1.1-1.EL.1.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.6.src.rpm
2dba3dbe86e2a5af412b04df4517feb5  xorg-x11-6.8.2-1.EL.13.6.src.rpm

i386:
929e3eed6d26851a9d54a37233bbc27a  xorg-x11-6.8.2-1.EL.13.6.i386.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
1398297f8b44a8c4e4122deb1ae771af  xorg-x11-Xdmx-6.8.2-1.EL.13.6.i386.rpm
a20d1ba0cf7250107d8efb3732d6e2a2  xorg-x11-Xnest-6.8.2-1.EL.13.6.i386.rpm
ad10533df90db4a3e0979d2fedf7442f  xorg-x11-Xvfb-6.8.2-1.EL.13.6.i386.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
659022a4612999b92f3ba9cba20e9e45  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.i386.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
e8e824b5347847c659bb619ed314e3a2  xorg-x11-doc-6.8.2-1.EL.13.6.i386.rpm
878dfb417f0d4b5e83c1ad52ff0b95c7  xorg-x11-font-utils-6.8.2-1.EL.13.6.i386.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
d27848037b05c9617df85ec1cbea8a0a  xorg-x11-sdk-6.8.2-1.EL.13.6.i386.rpm
ddb4636146713713c515e3adf3dedbb6  xorg-x11-tools-6.8.2-1.EL.13.6.i386.rpm
9b0db26123bdbd93e68b26a48070dc91  xorg-x11-twm-6.8.2-1.EL.13.6.i386.rpm
1d243d49b11097f19bc4b8024116d768  xorg-x11-xauth-6.8.2-1.EL.13.6.i386.rpm
28071508ebae9a7199e18d39b8c0a0da  xorg-x11-xdm-6.8.2-1.EL.13.6.i386.rpm
87f823b62cc8d14ba7e210ecc5128239  xorg-x11-xfs-6.8.2-1.EL.13.6.i386.rpm

ia64:
47311d507127140fa7b8834253c92504  xorg-x11-6.8.2-1.EL.13.6.ia64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
63b77466005af3adab8a70553f9af76d  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.ia64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
add55b457c1586513ce4da878414facb  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.ia64.rpm
1f4d00f14fe8b054077b2e47013ac91c  xorg-x11-Xdmx-6.8.2-1.EL.13.6.ia64.rpm
32d44ba2debb44f7347168588e993341  xorg-x11-Xnest-6.8.2-1.EL.13.6.ia64.rpm
6ef27ddb05bd9e35ee58467a0b5536a0  xorg-x11-Xvfb-6.8.2-1.EL.13.6.ia64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
66782152068d7fa5bb087e4c74015b2b  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.ia64.rpm
c84efd56af00b752bfc99a703c7675eb  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.ia64.rpm
1b5dc63a7f68d8f02b9c0356eb3b7699  xorg-x11-devel-6.8.2-1.EL.13.6.ia64.rpm
e9b77bacfd93d7fc9e8351a34c5549f4  xorg-x11-doc-6.8.2-1.EL.13.6.ia64.rpm
acfeafe21d383d161217e79dbb1ce2b0  xorg-x11-font-utils-6.8.2-1.EL.13.6.ia64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
81bbe494292f140e131b369f6f0e856c  xorg-x11-libs-6.8.2-1.EL.13.6.ia64.rpm
3545cfd3ea100e24489a5a2eb3441ed1  xorg-x11-sdk-6.8.2-1.EL.13.6.ia64.rpm
dd76d64850fdd1cf1e48c229d3e6cdc2  xorg-x11-tools-6.8.2-1.EL.13.6.ia64.rpm
6711dd7324215cfd204a881d66aae71e  xorg-x11-twm-6.8.2-1.EL.13.6.ia64.rpm
2938ad6054837b6ea74b505bc9bc3dad  xorg-x11-xauth-6.8.2-1.EL.13.6.ia64.rpm
4a590403f973be5dcd50351f2d2cbfb0  xorg-x11-xdm-6.8.2-1.EL.13.6.ia64.rpm
0ad142870d28728c614332cdd9e7e095  xorg-x11-xfs-6.8.2-1.EL.13.6.ia64.rpm

noarch:
dd704e58721845f2a1acda4e04564ef6  fonts-xorg-100dpi-6.8.1.1-1.EL.1.noarch.rpm
42fa5b7ed066290417f5898779048490  fonts-xorg-75dpi-6.8.1.1-1.EL.1.noarch.rpm
ce95e5f4b909f42222ab409ed76620d8  fonts-xorg-ISO8859-14-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c852bc8ee37e53cc0a9a73bd70a1b270  fonts-xorg-ISO8859-14-75dpi-6.8.1.1-1.EL.1.noarch.rpm
a5b24d88e1003b482499bfa96d25d928  fonts-xorg-ISO8859-15-100dpi-6.8.1.1-1.EL.1.noarch.rpm
71124cb7237dd199178543e665f52a7c  fonts-xorg-ISO8859-15-75dpi-6.8.1.1-1.EL.1.noarch.rpm
0a0397c7fa7cf49cf7f13c836cf16966  fonts-xorg-ISO8859-2-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c86ed69319ad29efb3341602beca7502  fonts-xorg-ISO8859-2-75dpi-6.8.1.1-1.EL.1.noarch.rpm
929d259a1dd23a32300d0723ddcf59ac  fonts-xorg-ISO8859-9-100dpi-6.8.1.1-1.EL.1.noarch.rpm
b7617d7d6a4043f54be749edee492f0f  fonts-xorg-ISO8859-9-75dpi-6.8.1.1-1.EL.1.noarch.rpm
b1c6a8bc4b7954f4287f1cf98d69b7ee  fonts-xorg-base-6.8.1.1-1.EL.1.noarch.rpm
7895c40fd271833f95a5135d13ec7424  fonts-xorg-cyrillic-6.8.1.1-1.EL.1.noarch.rpm
9b61b5e9f8c0c45d735516e7b9af3199  fonts-xorg-syriac-6.8.1.1-1.EL.1.noarch.rpm
ba92067475164be276245d18b1df9ab1  fonts-xorg-truetype-6.8.1.1-1.EL.1.noarch.rpm

x86_64:
7eac765bcadc655a71bbbc26602f9c80  xorg-x11-6.8.2-1.EL.13.6.x86_64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
17991a3fb674b998dde4b118e35f7d97  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.x86_64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
decfa448f5036c287d6e38e633c1c361  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.x86_64.rpm
002e2bcb042f8547cdffcd9aff2e7259  xorg-x11-Xdmx-6.8.2-1.EL.13.6.x86_64.rpm
9f82fbdc5686f0e153411fe56cb134c9  xorg-x11-Xnest-6.8.2-1.EL.13.6.x86_64.rpm
8667a2f6b976b3dd1962b317954ecd2c  xorg-x11-Xvfb-6.8.2-1.EL.13.6.x86_64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
326b60e5e1ff0c23b54bfcce4cd322ba  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.x86_64.rpm
3d178960f317e479642063e9ca7dc62b  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.x86_64.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
537d92cdd68176f3c501c215a610e875  xorg-x11-devel-6.8.2-1.EL.13.6.x86_64.rpm
5f6a4e9550260ba78c5a443d1fb24327  xorg-x11-doc-6.8.2-1.EL.13.6.x86_64.rpm
2b0fde296d39d5673e48f3e83d2b979d  xorg-x11-font-utils-6.8.2-1.EL.13.6.x86_64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
360ef0284fc8d6cbd4984c307a646b5c  xorg-x11-libs-6.8.2-1.EL.13.6.x86_64.rpm
443f434466e26ca22ecbf81b9c7c971f  xorg-x11-sdk-6.8.2-1.EL.13.6.x86_64.rpm
a318653f42be707e471619439d6f7477  xorg-x11-tools-6.8.2-1.EL.13.6.x86_64.rpm
ee6641809aaf841f978cd6e2bda4e36c  xorg-x11-twm-6.8.2-1.EL.13.6.x86_64.rpm
a807c44b9042a98ab6bb139e155c9879  xorg-x11-xauth-6.8.2-1.EL.13.6.x86_64.rpm
ec80175b0d439abdd33aa14772c9195f  xorg-x11-xdm-6.8.2-1.EL.13.6.x86_64.rpm
21f10a089d4eddb5482e4c590b376cf5  xorg-x11-xfs-6.8.2-1.EL.13.6.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/fonts-xorg-6.8.1.1-1.EL.1.src.rpm
d302e5b21428558a5954f611390370ef  fonts-xorg-6.8.1.1-1.EL.1.src.rpm
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.6.src.rpm
2dba3dbe86e2a5af412b04df4517feb5  xorg-x11-6.8.2-1.EL.13.6.src.rpm

i386:
929e3eed6d26851a9d54a37233bbc27a  xorg-x11-6.8.2-1.EL.13.6.i386.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
1398297f8b44a8c4e4122deb1ae771af  xorg-x11-Xdmx-6.8.2-1.EL.13.6.i386.rpm
a20d1ba0cf7250107d8efb3732d6e2a2  xorg-x11-Xnest-6.8.2-1.EL.13.6.i386.rpm
ad10533df90db4a3e0979d2fedf7442f  xorg-x11-Xvfb-6.8.2-1.EL.13.6.i386.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
659022a4612999b92f3ba9cba20e9e45  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.i386.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
e8e824b5347847c659bb619ed314e3a2  xorg-x11-doc-6.8.2-1.EL.13.6.i386.rpm
878dfb417f0d4b5e83c1ad52ff0b95c7  xorg-x11-font-utils-6.8.2-1.EL.13.6.i386.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
d27848037b05c9617df85ec1cbea8a0a  xorg-x11-sdk-6.8.2-1.EL.13.6.i386.rpm
ddb4636146713713c515e3adf3dedbb6  xorg-x11-tools-6.8.2-1.EL.13.6.i386.rpm
9b0db26123bdbd93e68b26a48070dc91  xorg-x11-twm-6.8.2-1.EL.13.6.i386.rpm
1d243d49b11097f19bc4b8024116d768  xorg-x11-xauth-6.8.2-1.EL.13.6.i386.rpm
28071508ebae9a7199e18d39b8c0a0da  xorg-x11-xdm-6.8.2-1.EL.13.6.i386.rpm
87f823b62cc8d14ba7e210ecc5128239  xorg-x11-xfs-6.8.2-1.EL.13.6.i386.rpm

ia64:
47311d507127140fa7b8834253c92504  xorg-x11-6.8.2-1.EL.13.6.ia64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
63b77466005af3adab8a70553f9af76d  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.ia64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
add55b457c1586513ce4da878414facb  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.ia64.rpm
1f4d00f14fe8b054077b2e47013ac91c  xorg-x11-Xdmx-6.8.2-1.EL.13.6.ia64.rpm
32d44ba2debb44f7347168588e993341  xorg-x11-Xnest-6.8.2-1.EL.13.6.ia64.rpm
6ef27ddb05bd9e35ee58467a0b5536a0  xorg-x11-Xvfb-6.8.2-1.EL.13.6.ia64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
66782152068d7fa5bb087e4c74015b2b  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.ia64.rpm
c84efd56af00b752bfc99a703c7675eb  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.ia64.rpm
1b5dc63a7f68d8f02b9c0356eb3b7699  xorg-x11-devel-6.8.2-1.EL.13.6.ia64.rpm
e9b77bacfd93d7fc9e8351a34c5549f4  xorg-x11-doc-6.8.2-1.EL.13.6.ia64.rpm
acfeafe21d383d161217e79dbb1ce2b0  xorg-x11-font-utils-6.8.2-1.EL.13.6.ia64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
81bbe494292f140e131b369f6f0e856c  xorg-x11-libs-6.8.2-1.EL.13.6.ia64.rpm
3545cfd3ea100e24489a5a2eb3441ed1  xorg-x11-sdk-6.8.2-1.EL.13.6.ia64.rpm
dd76d64850fdd1cf1e48c229d3e6cdc2  xorg-x11-tools-6.8.2-1.EL.13.6.ia64.rpm
6711dd7324215cfd204a881d66aae71e  xorg-x11-twm-6.8.2-1.EL.13.6.ia64.rpm
2938ad6054837b6ea74b505bc9bc3dad  xorg-x11-xauth-6.8.2-1.EL.13.6.ia64.rpm
4a590403f973be5dcd50351f2d2cbfb0  xorg-x11-xdm-6.8.2-1.EL.13.6.ia64.rpm
0ad142870d28728c614332cdd9e7e095  xorg-x11-xfs-6.8.2-1.EL.13.6.ia64.rpm

noarch:
dd704e58721845f2a1acda4e04564ef6  fonts-xorg-100dpi-6.8.1.1-1.EL.1.noarch.rpm
42fa5b7ed066290417f5898779048490  fonts-xorg-75dpi-6.8.1.1-1.EL.1.noarch.rpm
ce95e5f4b909f42222ab409ed76620d8  fonts-xorg-ISO8859-14-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c852bc8ee37e53cc0a9a73bd70a1b270  fonts-xorg-ISO8859-14-75dpi-6.8.1.1-1.EL.1.noarch.rpm
a5b24d88e1003b482499bfa96d25d928  fonts-xorg-ISO8859-15-100dpi-6.8.1.1-1.EL.1.noarch.rpm
71124cb7237dd199178543e665f52a7c  fonts-xorg-ISO8859-15-75dpi-6.8.1.1-1.EL.1.noarch.rpm
0a0397c7fa7cf49cf7f13c836cf16966  fonts-xorg-ISO8859-2-100dpi-6.8.1.1-1.EL.1.noarch.rpm
c86ed69319ad29efb3341602beca7502  fonts-xorg-ISO8859-2-75dpi-6.8.1.1-1.EL.1.noarch.rpm
929d259a1dd23a32300d0723ddcf59ac  fonts-xorg-ISO8859-9-100dpi-6.8.1.1-1.EL.1.noarch.rpm
b7617d7d6a4043f54be749edee492f0f  fonts-xorg-ISO8859-9-75dpi-6.8.1.1-1.EL.1.noarch.rpm
b1c6a8bc4b7954f4287f1cf98d69b7ee  fonts-xorg-base-6.8.1.1-1.EL.1.noarch.rpm
7895c40fd271833f95a5135d13ec7424  fonts-xorg-cyrillic-6.8.1.1-1.EL.1.noarch.rpm
9b61b5e9f8c0c45d735516e7b9af3199  fonts-xorg-syriac-6.8.1.1-1.EL.1.noarch.rpm
ba92067475164be276245d18b1df9ab1  fonts-xorg-truetype-6.8.1.1-1.EL.1.noarch.rpm

x86_64:
7eac765bcadc655a71bbbc26602f9c80  xorg-x11-6.8.2-1.EL.13.6.x86_64.rpm
96cab0d4fc9c87976ecfdf11a1905f7f  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.i386.rpm
17991a3fb674b998dde4b118e35f7d97  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.6.x86_64.rpm
0c663e4bbd00269a2eb720010836afa5  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.i386.rpm
decfa448f5036c287d6e38e633c1c361  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.6.x86_64.rpm
002e2bcb042f8547cdffcd9aff2e7259  xorg-x11-Xdmx-6.8.2-1.EL.13.6.x86_64.rpm
9f82fbdc5686f0e153411fe56cb134c9  xorg-x11-Xnest-6.8.2-1.EL.13.6.x86_64.rpm
8667a2f6b976b3dd1962b317954ecd2c  xorg-x11-Xvfb-6.8.2-1.EL.13.6.x86_64.rpm
8f2028fced8c9bef09052270f731833d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.i386.rpm
326b60e5e1ff0c23b54bfcce4cd322ba  xorg-x11-deprecated-libs-6.8.2-1.EL.13.6.x86_64.rpm
3d178960f317e479642063e9ca7dc62b  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.6.x86_64.rpm
de3652564eecb118083476793925cb21  xorg-x11-devel-6.8.2-1.EL.13.6.i386.rpm
537d92cdd68176f3c501c215a610e875  xorg-x11-devel-6.8.2-1.EL.13.6.x86_64.rpm
5f6a4e9550260ba78c5a443d1fb24327  xorg-x11-doc-6.8.2-1.EL.13.6.x86_64.rpm
2b0fde296d39d5673e48f3e83d2b979d  xorg-x11-font-utils-6.8.2-1.EL.13.6.x86_64.rpm
3b71893736c518ef46d88fa24caa1d68  xorg-x11-libs-6.8.2-1.EL.13.6.i386.rpm
360ef0284fc8d6cbd4984c307a646b5c  xorg-x11-libs-6.8.2-1.EL.13.6.x86_64.rpm
443f434466e26ca22ecbf81b9c7c971f  xorg-x11-sdk-6.8.2-1.EL.13.6.x86_64.rpm
a318653f42be707e471619439d6f7477  xorg-x11-tools-6.8.2-1.EL.13.6.x86_64.rpm
ee6641809aaf841f978cd6e2bda4e36c  xorg-x11-twm-6.8.2-1.EL.13.6.x86_64.rpm
a807c44b9042a98ab6bb139e155c9879  xorg-x11-xauth-6.8.2-1.EL.13.6.x86_64.rpm
ec80175b0d439abdd33aa14772c9195f  xorg-x11-xdm-6.8.2-1.EL.13.6.x86_64.rpm
21f10a089d4eddb5482e4c590b376cf5  xorg-x11-xfs-6.8.2-1.EL.13.6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCpxDaXlSAg2UNWIIRAtg9AKDDofS+B4pUMuNKw735PgUnevGkRACfdyJL
sIhoqAQwooe0WqsyATFFACA=
=LN8v
- -----END PGP SIGNATURE-----




4.




- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1
Advisory ID:       RHSA-2005:420-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-420.html
Issue date:        2005-06-08
Updated on:        2005-06-08
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0136 CAN-2005-1264
- - ---------------------------------------------------------------------

1. Summary:

Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4.  This is the
first regular update.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64

3. Problem description:

The Linux kernel handles the basic functions of the operating system.

This is the first regular kernel update to Red Hat Enterprise Linux 4.

A flaw affecting the auditing code was discovered.  On Itanium
architectures a local user could use this flaw to cause a denial of service
(crash).  This issue is rated as having important security impact
(CAN-2005-0136). 

A flaw was discovered in the servicing of a raw device ioctl.  A local user
who has access to raw devices could use this flaw to write to kernel memory
and cause a denial of service or potentially gain privileges.  This issue
is rated as having moderate security impact (CAN-2005-1264). 

New features introduced by this update include:
- - - Fixed TCP BIC congestion handling.
- - - Diskdump support for more controllers (megaraid, SATA)
- - - Device mapper multipath support
- - - AMD64 dual core support.
- - - Intel ICH7 hardware support.

There were many bug fixes in various parts of the kernel.  The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.

The following device drivers have been upgraded to new versions:
 ata_piix -------- 1.03
 bonding --------- 2.6.1
 e1000 ----------- 5.6.10.1-k2-NAPI
 e100 ------------ 3.3.6-k2-NAPI
 ibmveth --------- 1.03
 libata ---------- 1.02 to 1.10
 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2
 megaraid_mbox --- 2.20.4.0 to 2.20.4.5
 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5
 sata_nv --------- 0.03 to 0.6
 sata_promise ---- 1.00 to 1.01
 sata_sil -------- 0.8
 sata_sis -------- 0.5
 sata_svw -------- 1.05
 sata_sx4 -------- 0.7
 sata_via -------- 1.0
 sata_vsc -------- 1.0
 tg3 ------------- 3.22-rh
 ipw2100 --------- 1.0.3
 ipw2200 --------- 1.0.0

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

133590 - PTRACE_ATTACH race with real parent's wait calls can produced bogus wait returns
134338 - Intolerable Disk I/O Performance under 64-bit VM: fix I/O buffers
137154 - "waitid(POSIX Interface)" cannot run properly.
138563 - [PATCH] RHEL4 U1: EFI GPT: reduce alternate header probing
140083 - lx-choptp19 crashed running 2.4.21-20.EL.BZ131027.hotfixhugemem
140383 - BLKFLSBUF ioctl can cause other reads
140472 - x86, x86_64 and IA64 scsi inquiry command hangs in wait_for_completion
141983 - RHEL4 U2: DBS: quiet warning messages from cpufreq.c
142167 - [RHEL4][Diskdump] smp_call_function issue
142464 - [PATCH] "RPC: garbage, exit EIO" when using NFSv3 with Kerberos 5
143073 - traced process cannot be killed
143472 - hugetlb mmap failed in compatibility mode in em64t
143907 - ext2 and device dm-0 byond 2Terabyte causes /var/log/messages file size to crash system
144741 - RHEL4 U1: ICH7 Support patch
145424 - problems with ipsec from rhel3 to rhel4
146067 - [PATCH] Channel bonding driver configured in 802.3 ad mode causes kernel panic when shutdwon
146089 - 20050115 ptrace/kill and ptrace/dump race fixes
146703 - NLM (NFSv3) problems when mounting with "sec=krb5"
146797 - SCTP memory consumption and system freezes
146911 - Thread suspension via async signal fails on rhel4-rc2
147832 - oom-killer triggered during Red Hat Cert
150110 - chipset identifier for zx2
150151 - Lockd callbacks to NFS clients fail completely
151284 - mmap of file over NFS corrupts data
152101 - host panics when mounting nfs4 volumes
152102 - host loses connection to nfs server when the server is solaris
152557 - 20050117 Oopsable NFS locking
154221 - Thread exits siliently via __RESTORE_ALL exeception for iret
154639 - kernel thread current->mm dereference in grab_swap_token causes oops
154972 - unexplained SIGSEGV death in SIGSEGV signal handler
155283 - CAN-2005-0136 ptrace corner cases on ia64
155765 - oops on 2.6.9-5.0.5.ELsmp
156875 - libata - master supports lba48 but slave does not
157450 - CAN-2005-1263 Linux kernel ELF core dump privilege elevation


6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

ppc:
8dcdc040cbd00928243a20775d5123d6  kernel-2.6.9-11.EL.ppc64.rpm
a0e9ca3943927b5cff3b6f238d4ff5d0  kernel-2.6.9-11.EL.ppc64iseries.rpm
1cf5c458b3ecc950277ea59d8f0400c9  kernel-devel-2.6.9-11.EL.ppc64.rpm
e92a1ba8d256a695153d87e9e8ba0ad6  kernel-devel-2.6.9-11.EL.ppc64iseries.rpm

s390:
c91ca50ecb980e3abbead7c520e9569d  kernel-2.6.9-11.EL.s390.rpm
c3520b5d55fa1102c2100d56173aecc5  kernel-devel-2.6.9-11.EL.s390.rpm

s390x:
ecf96ac8781675ec8678a73423e3dab9  kernel-2.6.9-11.EL.s390x.rpm
1ca331b341899002794c77de16f17104  kernel-devel-2.6.9-11.EL.s390x.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kernel-2.6.9-11.EL.src.rpm
708e5239dd9d9a9a425d0f5d77489806  kernel-2.6.9-11.EL.src.rpm

i386:
8cd6de3e57442035516b60f12911e067  kernel-2.6.9-11.EL.i686.rpm
ecc10b63ecd7c909e0272eb86f2d21c0  kernel-devel-2.6.9-11.EL.i686.rpm
0a3ca2d16911ce2f882b16d00b459683  kernel-hugemem-2.6.9-11.EL.i686.rpm
2938d82720a88684d78735307c154d7b  kernel-hugemem-devel-2.6.9-11.EL.i686.rpm
84082bb98ce1d8131e67622e9584d209  kernel-smp-2.6.9-11.EL.i686.rpm
23a494cfcc0161ab8504e3200a3ee5a0  kernel-smp-devel-2.6.9-11.EL.i686.rpm

ia64:
2892022024e23e29b1c1da1100c0ef8b  kernel-2.6.9-11.EL.ia64.rpm
a51565dfad63ff5ff980e9ceb30e51cd  kernel-devel-2.6.9-11.EL.ia64.rpm

noarch:
bda3f275715e889b1b1111cd5b372873  kernel-doc-2.6.9-11.EL.noarch.rpm

x86_64:
160141d384ecd5b072a0476b6dd07973  kernel-2.6.9-11.EL.x86_64.rpm
805b6de472bbe54f74028c823fd82d78  kernel-devel-2.6.9-11.EL.x86_64.rpm
eedc9ef7106687b1177a688371c004c2  kernel-smp-2.6.9-11.EL.x86_64.rpm
35606ad7ab97e97d6f1a88776b6d389c  kernel-smp-devel-2.6.9-11.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1264

8. Contact:

The Red Hat security contact is <secalert@xxxxxxxxxx>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCpxD/XlSAg2UNWIIRAvwxAKCdE29qtq6bNL3OaWRsOPn3k6wozwCfWnR9
nWmUWKsGF2xjSaFI0MntRac=
=VtLM
- -----END PGP SIGNATURE-----


- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 870 487 0748 Ext 4511
Fax: +44 (0) 870 487 0749

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 870 487 0748 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Red Hat for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBQqhOgopao72zK539AQHmowP/Tv6U9LAgVsuC0Sjk+cmJRkt6W9Bh3WZD
Ug+RhiudZ71pWnK3fmJ16KGSgaCdTi9QMj4v+GHNXzJcIzJO+ybNHHtZ5UshS3W2
6iWtsJAIzVeBxIfJNXXjAOyO8eKmrF3vFEZmu+9ec5/LNMSmougruJSnQImg8BtZ
FUOk9ssXGeY=
=ue4+
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________