The OVAL Repository5.52015-09-03T07:30:10.497-04:00RHSA-2009:1427 -- fetchmail security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5fetchmailAn updated fetchmail package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0010 -- squirrelmail security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5squirrelmailAn updated squirrelmail package that resolves various security issues is
now available for Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
SquirrelMail is an easy-to-configure, standards-based, webmail package
written in PHP. It includes built-in PHP support for the IMAP and SMTP
protocols, and pure HTML 4.0 page-rendering (with no JavaScript required)
for maximum browser-compatibility, strong MIME support, address books, and
folder manipulation.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0261 -- vnc security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3vncUpdated vnc packages to correct a security issue are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1625 -- expat security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5expatUpdated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Expat is a C library written by James Clark for parsing XML documents.
Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1066 -- squirrelmail security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5squirrelmailAn updated squirrelmail package that fixes multiple security issues is now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
SquirrelMail is a standards-based webmail package written in PHP.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1579 -- httpd security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3CentOS Linux 3CentOS Linux 5httpdUpdated httpd packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 3 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
The Apache HTTP Server is a popular Web server.
A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure
Sockets Layer) protocols handle session renegotiation. A man-in-the-middle
attacker could use this flaw to prefix arbitrary plain text to a client's
session (for example, an HTTPS connection to a website). This could force
the server to process an attacker's request as if authenticated using the
victim's credentials. This update partially mitigates this flaw for SSL
sessions to HTTP servers using mod_ssl by rejecting client-requested
renegotiation. (CVE-2009-3555)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0988 -- libxml2 security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 3CentOS Linux 2libxml2Updated libxml2 packages that fix security issues are now available for
Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
libxml2 is a library for parsing and manipulating XML files. It includes
support for reading, modifying, and writing XML and HTML files.
An integer overflow flaw causing a heap-based buffer overflow was found in
the libxml2 XML parser. If an application linked against libxml2 processed
untrusted, malformed XML content, it could cause the application to crash
or, possibly, execute arbitrary code. (CVE-2008-4226)
A denial of service flaw was discovered in the libxml2 XML parser. If an
application linked against libxml2 processed untrusted, malformed XML
content, it could cause the application to enter an infinite loop.
(CVE-2008-4225)
Red Hat would like to thank Drew Yao of the Apple Product Security team for
reporting these issues.
Users of libxml2 are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0967 -- httpd security and bug fix update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 3httpdUpdated httpd packages that resolve several security issues and fix a bug
are now available for Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
The Apache HTTP Server is a popular Web server.
A flaw was found in the mod_proxy Apache module. An attacker in control of
a Web server to which requests were being proxied could have caused a
limited denial of service due to CPU consumption and stack exhaustion.
(CVE-2008-2364)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1646 -- libtool security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5libtoolUpdated libtool packages that fix one security issue are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1549 -- wget security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 5wgetAn updated wget package that fixes a security issue is now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
GNU Wget is a file retrieval utility that can use HTTP, HTTPS, and FTP.
Daniel Stenberg reported that Wget is affected by the previously published
null prefix attack, caused by incorrect handling of NULL characters in
X.509 certificates. If an attacker is able to get a carefully-crafted
certificate signed by a trusted Certificate Authority, the attacker could
use the certificate during a man-in-the-middle attack and potentially
confuse Wget into accepting it by mistake. (CVE-2009-3490)
Wget users should upgrade to this updated package, which contains a
backported patch to correct this issue.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0836 -- libxml2 security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 2CentOS Linux 5libxml2Updated libxml2 packages that fix a security issue are now available.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
The original fix used in this errata caused some applications using
the libxml2 library in an unexpected way to crash when used with updated
libxml2 packages. We have updated the packages for Red Hat Enterprise Linux
3, 4 and 5 to use a different fix that does not break affected
applications.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1218 -- pidgin security update (Critical)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 3pidginUpdated pidgin packages that fix a security issue are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Pidgin is an instant messaging program which can log in to multiple
accounts on multiple instant messaging networks simultaneously.
Federico Muttis of Core Security Technologies discovered a flaw in Pidgin's
MSN protocol handler. If a user received a malicious MSN message, it was
possible to execute arbitrary code with the permissions of the user running
Pidgin. (CVE-2009-2694)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1219 -- libvorbis security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 3libvorbisUpdated libvorbis packages that fix one security issue are now available
for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The libvorbis packages contain runtime libraries for use in programs that
support Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and
royalty-free, general-purpose compressed audio format.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0057 -- squirrelmail security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5squirrelmailAn updated squirrelmail package that fixes a security issue is now
available for Red Hat Enterprise Linux 3, 4 and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
SquirrelMail is an easy-to-configure, standards-based, webmail package
written in PHP. It includes built-in PHP support for the IMAP and SMTP
protocols, and pure HTML 4.0 page-rendering (with no JavaScript required)
for maximum browser-compatibility, strong MIME support, address books, and
folder manipulation.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0946 -- ed security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 2CentOS Linux 5edAn updated ed package that fixes one security issue is now available for
Red Hat Enterprise Linux 2.1, 3, 4 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
ed is a line-oriented text editor, used to create, display, and modify
text files (both interactively and via shell scripts).
A heap-based buffer overflow was discovered in the way ed, the GNU line
editor, processed long file names. An attacker could create a file with a
specially-crafted name that could possibly execute an arbitrary code when
opened in the ed editor. (CVE-2008-3916)
Users of ed should upgrade to this updated package, which contains
a backported patch to resolve this issue.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0971 -- net-snmp security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 3net-snmpUpdated net-snmp packages that fix a security issue are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The Simple Network Management Protocol (SNMP) is a protocol used for
network management.
A denial-of-service flaw was found in the way Net-SNMP processes SNMP
GETBULK requests. A remote attacker who issued a specially-crafted request
could cause the snmpd server to crash. (CVE-2008-4309)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1490 -- squirrelmail security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3squirrelmailAn updated squirrelmail package that fixes several security issues is now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0937 -- cups security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5cupsUpdated cups packages that fix multiple security issues are now available
for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0345 -- ghostscript security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3ghostscriptUpdated ghostscript packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Ghostscript is a set of software that provides a PostScript(TM)
interpreter, a set of C procedures (the Ghostscript library, which
implements the graphics capabilities in the PostScript language) and
an interpreter for Portable Document Format (PDF) files.
Multiple integer overflow flaws which could lead to heap-based buffer
overflows, as well as multiple insufficient input validation flaws, were
found in Ghostscript's International Color Consortium Format library
(icclib). Using specially-crafted ICC profiles, an attacker could create a
malicious PostScript or PDF file with embedded images which could cause
Ghostscript to crash, or, potentially, execute arbitrary code when opened
by the victim. (CVE-2009-0583, CVE-2009-0584)
All users of ghostscript are advised to upgrade to these updated packages,
which contain a backported patch to correct these issues.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1561 -- libvorbis security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5libvorbisUpdated libvorbis packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The libvorbis packages contain runtime libraries for use in programs that
support Ogg Vorbis. Ogg Vorbis is a fully open, non-proprietary, patent-and
royalty-free, general-purpose compressed audio format.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0544 -- php security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3CentOS Linux 3CentOS Linux 5phpUpdated PHP packages that fix several security issues are now available for
Red Hat Enterprise Linux 3 and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
PHP is an HTML-embedded scripting language commonly used with the Apache
HTTP Web server.
It was discovered that the PHP escapeshellcmdfunction did not properly
escape multi-byte characters which are not valid in the locale used by the
script. This could allow an attacker to bypass quoting restrictions imposed
by escapeshellcmdand execute arbitrary commands if the PHP script was
using certain locales. Scripts using the default UTF-8 locale are not
affected by this issue. (CVE-2008-2051)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0584 -- pidgin security and bug fix update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5pidginUpdated Pidgin packages that fix a security issue and address a bug are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Pidgin is a multi-protocol Internet Messaging client.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0018 -- xterm security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 5xtermAn updated xterm package to correct a security issue is now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The xterm program is a terminal emulator for the X Window System.
A flaw was found in the xterm handling of Device Control Request Status
String (DECRQSS) escape sequences. An attacker could create a malicious
text file (or log entry, if unfiltered) that could run arbitrary commands
if read by a victim inside an xterm window. (CVE-2008-2383)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1209 -- curl security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5curlUpdated curl packages that fix security issues are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict
servers, using any of the supported protocols. cURL is designed to work
without user interaction or any kind of interactivity.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1426 -- openoffice.org security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3openoffice.orgopenoffice.org2Updated openoffice.org packages that correct security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
OpenOffice.org is an office productivity suite that includes desktop
applications, such as a word processor, spreadsheet, presentation manager,
formula editor, and a drawing program.
An integer underflow flaw and a boundary error flaw, both possibly leading
to a heap-based buffer overflow, were found in the way OpenOffice.org
parses certain records in Microsoft Word documents. An attacker could
create a specially-crafted Microsoft Word document, which once opened by an
unsuspecting user, could cause OpenOffice.org to crash or, potentially,
execute arbitrary code with the permissions of the user running
OpenOffice.org. (CVE-2009-0200, CVE-2009-0201)
All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain backported patches to correct these issues. All
running instances of OpenOffice.org applications must be restarted for
this update to take effect.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0313 -- wireshark security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3wiresharkUpdated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
Multiple buffer overflow flaws were found in Wireshark. If Wireshark read
a malformed packet off a network or opened a malformed dump file, it could
crash or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2008-4683, CVE-2009-0599)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0939 -- openoffice.org security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5openoffice.orgopenoffice.org2Updated openoffice.org packages that correct security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0849 -- ipsec-tools security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 5ipsec-toolsAn updated ipsec-tools package that fixes two security issues is now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1463 -- newt security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5newtUpdated newt packages that fix one security issue are now available for Red
Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Newt is a programming library for color text mode, widget-based user
interfaces. Newt can be used to add stacked windows, entry widgets,
checkboxes, radio buttons, labels, plain text fields, scrollbars, and so
on, to text mode user interfaces.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0893 -- bzip2 security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5CentOS Linux 2bzip2Updated bzip2 packages that fix a security issue are now available for Red
Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Bzip2 is a freely available, high-quality data compressor. It provides both
stand-alone compression and decompression utilities, as well as a shared
library for use with other programs.
A buffer over-read flaw was discovered in the bzip2 decompression routine.
This issue could cause an application linked against the libbz2 library to
crash when decompressing malformed archives. (CVE-2008-1372)
Users of bzip2 should upgrade to these updated packages, which contain a
backported patch to resolve this issue.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0884 -- libxml2 security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5libxml2Updated libxml2 packages that fix a security issue are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The libxml2 packages provide a library that allows you to manipulate XML
files. It includes support to read, modify, and write XML and HTML files.
A heap-based buffer overflow flaw was found in the way libxml2 handled long
XML entity names. If an application linked against libxml2 processed
untrusted malformed XML content, it could cause the application to crash
or, possibly, execute arbitrary code. (CVE-2008-3529)
All users of libxml2 are advised to upgrade to these updated packages,
which contain a backported patch to resolve this issue.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0890 -- wireshark security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5wiresharkUpdated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
Multiple buffer overflow flaws were found in Wireshark. If Wireshark read
a malformed packet off a network, it could crash or, possibly, execute
arbitrary code as the user running Wireshark. (CVE-2008-3146)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0020 -- bind security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 2CentOS Linux 3bindUpdated Bind packages to correct a security issue are now available for Red
Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.
A flaw was discovered in the way BIND checked the return value of the
OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone
could present a malformed DSA certificate and bypass proper certificate
validation, allowing spoofing attacks. (CVE-2009-0025)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0341 -- curl security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 2curlUpdated curl packages that fix a security issue are now available for Red
Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict
servers, using any of the supported protocols. cURL is designed to work
without user interaction or any kind of interactivity.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0965 -- lynx security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 5CentOS Linux 3CentOS Linux 2lynxAn updated lynx package that corrects two security issues is now available
for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Lynx is a text-based Web browser.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1206 -- libxml and libxml2 security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5libxmllibxml2Updated libxml and libxml2 packages that fix multiple security issues are
now available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
libxml is a library for parsing and manipulating XML files. A Document Type
Definition (DTD) defines the legal syntax (and also which elements can be
used) for certain types of files, such as XML files.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0476 -- pango security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5pangoevolution28-pangoUpdated pango and evolution28-pango packages that fix an integer overflow
flaw are now available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Pango is a library used for the layout and rendering of internationalized
text.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1100 -- wireshark security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5wiresharkUpdated wireshark packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.
A format string flaw was found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash or,
possibly, execute arbitrary code as the user running Wireshark. (CVE-2009-1210)
Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2009-1268, CVE-2009-1269, CVE-2009-1829)
Users of wireshark should upgrade to these updated packages, which contain
Wireshark version 1.0.8, and resolve these issues. All running instances of
Wireshark must be restarted for the update to take effect.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:1159 -- libtiff security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5libtiffUpdated libtiff packages that fix several security issues are now available
for Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0474 -- acpid security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 5acpidAn updated acpid package that fixes one security issue is now available
for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
acpid is a daemon that dispatches ACPI (Advanced Configuration and Power
Interface) events to user-space programs.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0533 -- bind security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 5CentOS Linux 2CentOS Linux 3bindselinux-policy-targetedselinux-policyUpdated bind packages that help mitigate DNS spoofing attacks are now
available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
We have updated the Enterprise Linux 5 packages in this advisory. The
default and sample caching-nameserver configuration files have been updated
so that they do not specify a fixed query-source port. Administrators
wishing to take advantage of randomized UDP source ports should check their
configuration file to ensure they have not specified fixed query-source ports.
ISC BIND (Berkeley Internet Name Domain) is an implementation of the DNS
(Domain Name System) protocols.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2009:0004 -- openssl security update (Important)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4CentOS Linux 3CentOS Linux 5CentOS Linux 2opensslopenssl095aopenssl096openssl096bopenssl097aUpdated OpenSSL packages that correct a security issue are now available
for Red Hat Enterprise Linux 2.1, 3, 4, and 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
OpenSSL is a toolkit that implements Secure Sockets Layer (SSL v2/v3) and
Transport Layer Security (TLS v1) protocols as well as a full-strength,
general purpose, cryptography library.
The Google security team discovered a flaw in the way OpenSSL checked the
verification of certificates. An attacker in control of a malicious server,
or able to effect a man in the middle attack, could present a malformed
SSL/TLS signature from a certificate chain to a vulnerable client and
bypass validation. (CVE-2008-5077)Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2008:0839 -- postfix security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 4Red Hat Enterprise Linux 5CentOS Linux 3CentOS Linux 5postfixUpdated postfix packages that fix a security issue are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL),
and TLS.
A flaw was found in the way Postfix dereferences symbolic links. If a local
user has write access to a mail spool directory with no root mailbox, it
may be possible for them to append arbitrary data to files that root has
write permission to. (CVE-2008-2936)
Red Hat would like to thank Sebastian Krahmer for responsibly disclosing
this issue.
All users of postfix should upgrade to these updated packages, which
contain a backported patch that resolves this issue.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDThe operating system installed on the system is Red Hat Enterprise Linux 4Red Hat Enterprise Linux 4The operating system installed on the system is Red Hat Enterprise Linux 4.Aharon CherninDRAFTINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDACCEPTEDThe operating system installed on the system is Red Hat Enterprise Linux 3Red Hat Enterprise Linux 3The operating system installed on the system is Red Hat Enterprise Linux 3.Aharon CherninDRAFTINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDACCEPTEDRHSA-2010:0534: libpng security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5libpnglibpng10Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0490: cups security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5cupsThe cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&URL=% and (2) /admin?URL=/admin/&OP=% URIs.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0697: samba security and bug fix update (Critical)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5sambaStack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0061: gzip security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5gzipInteger underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0488: samba and samba3x security update (Critical)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5sambasamba3xBuffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0720: mikmod security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5mikmodHeap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0703: bzip2 security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5bzip2Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0625: wireshark security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5wiresharkThe SigComp Universal Decompressor Virtual Machine (UDVM) in Wireshark 0.10.8 through 1.0.14 and 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to sigcomp-udvm.c and an off-by-one error, which triggers a buffer overflow, different vulnerabilities than CVE-2010-2287.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0039: gcc and gcc4 security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5gccgcc4ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0101: openoffice.org security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5openoffice.orgopenoffice.org2filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTSetBrc table property modifier in a Word document, related to a "boundary error flaw."Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0029: krb5 security update (Critical)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5krb5Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0423: krb5 security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5krb5The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0607: freetype security update (Important)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5freetypeMultiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0040: php security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3CentOS Linux 5phpThe htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0360: wireshark security update (Moderate)Red Hat Enterprise Linux 5Red Hat Enterprise Linux 3CentOS Linux 5wiresharkMultiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDRHSA-2010:0140: pango security update (Moderate)Red Hat Enterprise Linux 3Red Hat Enterprise Linux 5CentOS Linux 5pangoevolution28-pangoArray index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.Sergey ArtykhovDRAFTINTERIMACCEPTEDACCEPTEDThe operating system installed on the system is CentOS Linux 5.xCentOS Linux 5The operating system installed on the system is CentOS Linux 5.xDanny HaynesDRAFTINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDSergey ArtykhovINTERIMACCEPTEDACCEPTEDThe operating system installed on the system is Red Hat Enterprise Linux 5Red Hat Enterprise Linux 5The operating system installed on the system is Red Hat Enterprise Linux 5.Aharon CherninDRAFTINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDDragos PrisacaINTERIMACCEPTEDACCEPTEDfetchmailvnc-servervncexpat-develexpathttpd-manualmod_sslhttpd-develhttpd-suexechttpdlibtool-ltdllibtool-libslibtool-ltdl-devellibtoolwgetednet-snmpnet-snmp-utilsnet-snmp-libsnet-snmp-develnet-snmp-perlsquirrelmailhpijsghostscript-develghostscriptghostscript-gtklibvorbis-devellibvorbislibpurple-devellibpurple-tclpidginpidgin-perlfinch-devellibpurple-perlfinchpidgin-devellibpurplextermopenoffice.org2-langpack-svopenoffice.org2-langpack-th_THopenoffice.org2-javafilteropenoffice.org2-langpack-cs_CZopenoffice.org2-langpack-gl_ESopenoffice.org2-langpack-pl_PLopenoffice.org2-langpack-ca_ESopenoffice.org2-langpack-fi_FIopenoffice.org2-coreopenoffice.org2-langpack-lt_LTopenoffice.org2-langpack-bg_BGopenoffice.org2-langpack-pt_PTopenoffice.org2-langpack-deopenoffice.org2-langpack-hr_HRopenoffice.org2-langpack-bnopenoffice.org2-langpack-he_ILopenoffice.org2-langpack-eu_ESopenoffice.org2-xsltfilteropenoffice.org2-langpack-pa_INopenoffice.org2-langpack-gu_INopenoffice.org2-pyunoopenoffice.org2-langpack-nlopenoffice.org2-langpack-tr_TRopenoffice.org2-langpack-et_EEopenoffice.org2-langpack-da_DKopenoffice.org2-langpack-fropenoffice.org2-writeropenoffice.org2-langpack-el_GRopenoffice.org2-langpack-ko_KRopenoffice.org2-impressopenoffice.org2-langpack-itopenoffice.org2-langpack-aropenoffice.org2-langpack-sl_SIopenoffice.org2-langpack-ga_IEopenoffice.org2-langpack-sk_SKopenoffice.org2-langpack-hi_INopenoffice.org2-drawopenoffice.org2-langpack-cy_GBopenoffice.org2-baseopenoffice.org2-langpack-nn_NOopenoffice.org2-langpack-zh_TWopenoffice.org2-langpack-esopenoffice.org2-langpack-ta_INopenoffice.org-kdeopenoffice.org2-langpack-sr_CSopenoffice.org2-langpack-zu_ZAopenoffice.org-libsopenoffice.org2-graphicfilteropenoffice.org2-langpack-ja_JPopenoffice.org2-mathopenoffice.org2-langpack-ms_MYopenoffice.org2-langpack-nb_NOopenoffice.org2-emailmergeopenoffice.org2-langpack-zh_CNopenoffice.org2-langpack-ruopenoffice.org2-testtoolsopenoffice.org2-langpack-hu_HUopenoffice.org-i18nopenoffice.org2-langpack-pt_BRopenoffice.org2-langpack-af_ZAopenoffice.org2-calcipsec-toolsnewtnewt-develcurl-develcurllynxlibxml2-pythonlibxml-devellibxml2libxml2-devellibxmlevolution28-pango-develevolution28-pangolibtiff-devellibtiffacpidselinux-policy-strictselinux-policy-targeted-sourcesbind-develcaching-nameserverselinux-policyselinux-policy-mlsbind-sdbbind-chrootselinux-policy-develbindbind-libbind-develselinux-policy-targetedbind-utilsbind-libsopenssl096bopensslopenssl-perlopenssl-developenssl097apostfix-pflogsummpostfixlibpng-devellibpngcupscups-lpdcups-develcups-libsgziplibtalloc-develsamba-clientsamba3x-clientsamba3x-winbindsambasamba3x-swatlibsmbclient-devellibsmbclientsamba3x-winbind-devellibtdb-develsamba3xlibtdbsamba-swatsamba3x-domainjoin-guisamba-commontdb-toolslibtallocsamba3x-docsamba3x-commonmikmod-develmikmodbzip2-develbzip2-libsbzip2gcc-gnatcpplibgnatgccgcc-c++libmudflap-devellibgcjlibgcclibgcj-srcgcc-objcgcc-gfortranlibgcj-devellibobjcgcc-objc++libstdc++libstdc++-develgcc-javalibgfortranlibmudflapopenoffice.org-langpack-ko_KRopenoffice.org-drawopenoffice.org-sdk-docopenoffice.org-langpack-pt_PTopenoffice.org-emailmergeopenoffice.org-langpack-cy_GBopenoffice.org-langpack-kn_INopenoffice.org-headlessopenoffice.org-langpack-ja_JPopenoffice.org-langpack-pa_INopenoffice.org-langpack-zu_ZAopenoffice.org-langpack-hi_INopenoffice.org-langpack-nlopenoffice.org-coreopenoffice.org-impressopenoffice.org-javafilteropenoffice.org-langpack-ga_IEopenoffice.org-langpack-gl_ESopenoffice.org-langpack-sr_CSopenoffice.org-calcopenoffice.org-pyunoopenoffice.org-langpack-uropenoffice.org-xsltfilteropenoffice.org-langpack-sl_SIopenoffice.orgopenoffice.org-langpack-deopenoffice.org-langpack-gu_INopenoffice.org-langpack-tr_TRopenoffice.org-langpack-itopenoffice.org-langpack-sk_SKopenoffice.org-langpack-nr_ZAopenoffice.org-mathopenoffice.org-langpack-pt_BRopenoffice.org-writeropenoffice.org-langpack-zh_CNopenoffice.org-langpack-el_GRopenoffice.org-langpack-bg_BGopenoffice.org-langpack-hu_HUopenoffice.org-langpack-fi_FIopenoffice.org-langpack-ml_INopenoffice.org-langpack-mr_INopenoffice.org-langpack-af_ZAopenoffice.org-langpack-cs_CZopenoffice.org-langpack-bnopenoffice.org-langpack-eu_ESopenoffice.org-langpack-as_INopenoffice.org-langpack-aropenoffice.org-langpack-ss_ZAopenoffice.org-langpack-nso_ZAopenoffice.org-langpack-pl_PLopenoffice.org-langpack-ve_ZAopenoffice.org-langpack-he_ILopenoffice.org-langpack-or_INopenoffice.org-langpack-ruopenoffice.org-langpack-hr_HRopenoffice.org-langpack-nb_NOopenoffice.org-langpack-zh_TWopenoffice.org-langpack-et_EEopenoffice.org-langpack-ca_ESopenoffice.org-langpack-da_DKopenoffice.org-testtoolsopenoffice.org-langpack-th_THopenoffice.org-langpack-svopenoffice.org-baseopenoffice.org-langpack-lt_LTopenoffice.org-sdkopenoffice.org-langpack-nn_NOopenoffice.org-langpack-esopenoffice.org-langpack-xh_ZAopenoffice.org-langpack-st_ZAopenoffice.org-langpack-fropenoffice.org-langpack-ta_INopenoffice.org-langpack-ts_ZAopenoffice.org-graphicfilteropenoffice.org-langpack-te_INopenoffice.org-langpack-tn_ZAopenoffice.org-langpack-ms_MYkrb5-libskrb5-serverkrb5krb5-develkrb5-workstationfreetype-demosfreetype-develfreetypephp-develphpphp-imapphp-soapphp-pgsqlphp-dbaphp-ldapphp-mbstringphp-xmlrpcphp-odbcphp-gdphp-ncursesphp-pdophp-mysqlphp-bcmathphp-commonphp-xmlphp-cliphp-snmpwireshark-gnomewiresharkcentos-releaseredhat-releasepangopango-devel0:6.2.0-3.el3.50:6.2.5-6.0.1.el4_8.10:6.3.6-1.1.el5_3.10:1.4.8-5.el5.centos.20:1.4.8-5.el5_2.20:1.4.8-5.el4_7.20:1.4.8-8.el30:4.1.2-14.el5_3.10:4.0-0.beta4.1.80:4.0-12.el4_7.10:1.95.7-4.el4_8.20:1.95.5-6.20:1.95.8-8.3.el5_4.20:1.4.8-5.el5.centos.70:1.4.8-5.el5_3.70:1.4.8-13.el30:1.4.8-5.el4_8.50:2.2.3-31.el5_4.20:2.2.3-31.el5.centos.20:2.0.46-77.ent0:2.6.16-12.60:2.5.10-140:2.6.26-2.1.2.70:2.2.3-11.el5_2.40:2.2.3-11.el5.centos.40:2.0.52-41.ent.20:2.0.46-71.ent0:1.4.3-70:1.5.22-7.el5_40:1.5.6-5.el4_80:1.10.2-0.30E.10:1.10.2-1.el4_8.10:1.11.4-2.el5_4.10:2.6.26-2.1.2.30:2.6.16-12.30:2.5.10-110:2.6.26-2.1.2.40:1.5.1-4.el30:2.5.9-1.el40:2.5.9-1.el51:1.1.2-3.el5_3.31:1.0-11.el31:1.1.0-3.el4_8.20:1.4.8-5.el5.centos.30:1.4.8-9.el30:1.4.8-5.el5_2.30:1.4.8-5.el4_7.30:0.2-33.30E.10:0.2-36.el4_7.10:0.2-39.el5_21:5.1.2-13.el4_7.21:5.0.9-2.30E.251:5.3.1-24.el5_2.20:1.4.8-5.el5_4.100:1.4.8-5.el4_8.80:1.4.8-16.el31:1.1.17-13.3.541:1.1.22-0.rc1.9.27.el4_7.11:1.2.4-11.18.el5_2.20:1.3-32.1.170:7.05-32.1.170:7.07-33.2.el4_7.50:8.15.2-9.4.el5_3.41:1.0-12.el31:1.1.0-3.el4_8.31:1.1.2-3.el5_4.40:4.3.2-48.ent0:5.1.6-20.el5_2.10:1.5.1-2.el40:1.5.1-2.el30:2.3.1-2.el5_20:179-11.EL30:215-5.el5_2.20:192-8.el4_7.20:7.15.5-2.1.el5_3.50:7.12.1-11.1.el4_8.10:7.10.6-10.rhel31:1.1.2-44.2.0.EL31:1.1.5-10.6.0.7.EL4.11:2.0.4-5.7.0.6.0.11:2.3.0-6.11.el5_4.10:1.0.6-EL3.30:1.0.6-2.el5_30:1.0.6-2.el4_71:1.1.5-10.6.0.7.EL41:1.1.2-43.2.0.EL31:2.0.4-5.7.0.6.01:2.3.0-6.5.4.el5_20:0.3.3-7.el4_70:0.6.5-9.el5_2.30:0.2.5-0.7.rhel3.50:0.51.5-2.el30:0.51.6-10.el4_8.10:0.52.2-12.el5_4.10:1.0.2-14.el4_70:1.0.2-12.EL30:2.5.10-130:2.6.26-2.1.2.60:2.6.16-12.50:1.0.3-3.el4_70:1.0.3-EL3.30:1.0.3-4.el5_230:9.3.4-6.0.3.P1.el5_230:9.2.4-30.el4_7.130:9.2.4-23.el30:7.15.5-2.1.el5_3.40:7.12.1-11.1.el4_7.10:7.10.6-9.rhel30:2.8.5-28.1.el5_2.10:2.8.5-11.30:2.8.5-18.2.el4_7.10:2.6.16-12.71:1.8.17-9.30:2.6.26-2.1.2.80:2.5.10-150:1.8.17-9.30:1.14.9-5.el5.centos0:1.2.5-80:1.6.0-14.4_70:1.14.9-11.el4_70:1.14.9-5.el5_30:1.0.8-EL3.10:1.0.8-1.el4_8.10:1.0.8-1.el5_3.10:3.5.7-33.el30:3.8.2-7.el5_3.40:3.6.1-12.el4_8.40:1.0.3-2.el4_7.10:1.0.2-40:1.0.4-7.el5_3.10:2.4.6-137.1.el50:2.4.6-137.1.el5_230:9.3.4-6.0.1.P1.el5_230:9.3.4-6.0.2.P1.el5_20:1.17.30-2.150.el430:9.2.4-28.0.1.el430:9.2.4-22.el30:0.9.6b-22.46.el4_70:0.9.6b-16.490:0.9.8b-10.el5_2.10:0.9.7a-43.17.el4_7.20:0.9.7a-33.250:0.9.7a-9.el5_2.1^4\D.+$^3\D.+$2:2.0.16-14.1.RHEL32:2.2.10-1.2.1.el4_72:2.3.3-2.1.el5_22:1.2.10-7.1.el5_5.31:1.3.7-18.el5_5.40:3.0.33-3.29.el5_5.10:1.3.5-11.el5_4.10:3.0.33-3.29.el5_50:1.1.2-52.el5_50:1.2.0-52.el5_50:3.3.8-0.52.el5_50:3.1.6-39.el5_5.10:1.0.3-6.el5_50:1.0.15-1.el5_5.10:4.1.2-46.el5_4.21:2.3.0-6.11.el5_4.40:1.6.1-36.el5_4.10:1.6.1-36.el5_5.40:2.2.1-26.el5_50:5.1.6-24.el5_4.50:1.0.11-1.el5_5.5^5.*$unix^5\D.+$0:1.14.9-8.el5