Operating System:

[RedHat]

Published:

21 August 2006

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2006.0489 -- [RedHat]
                       Low: elfutils security update
                              21 August 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              elfutils
Publisher:            Red Hat
Operating System:     Red Hat Desktop 3
                      Red Hat Enterprise Linux AS/ES/WS 3
Impact:               Denial of Service
Access:               Existing Account
CVE Names:            CVE-2005-1704

Revision History:  August 21 2006: Added Red Hat bulletin for version 4
                   July 21 2006:   Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
 
- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: elfutils security update
Advisory ID:       RHSA-2006:0368-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0368.html
Issue date:        2006-07-20
Updated on:        2006-07-20
Product:           Red Hat Enterprise Linux
Keywords:          elfutils
CVE Names:         CVE-2005-1704 
- - ---------------------------------------------------------------------

1. Summary:

Updated elfutils packages that address a minor security issue and various
other issues are now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

The elfutils packages contain a number of utility programs and libraries
related to the creation and maintenance of executable code.

The elfutils packages that originally shipped with Red Hat Enterprise Linux
3 were GPL-licensed versions which lacked some functionality. Previous
updates provided fully functional versions of elfutils only under the OSL
license. This update provides a fully functional, GPL-licensed version of
elfutils. 

In the OSL-licensed elfutils versions provided in previous updates, some
tools could sometimes crash when given corrupted input files. (CVE-2005-1704)

Also, when the eu-strip tool was used to create separate debuginfo files
from relocatable objects such as kernel modules (.ko), the resulting
debuginfo files (.ko.debug) were sometimes corrupted.  Both of these
problems are fixed in the new version.

Users of elfutils should upgrade to these updated packages, which resolve
these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/):

159908 - CVE-2005-1704 Integer overflow in libelf
187507 - RHEL3 U8: Elfutils license upgrade
189114 - eu-strip mangles separate debuginfo with relocation sections

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/elfutils-0.94.1-2.src.rpm
f9c89885daf3d51a699b99db4855b33c  elfutils-0.94.1-2.src.rpm

i386:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
bdfc7c99932291ae6ab742fd60ae0ca0  elfutils-devel-0.94.1-2.i386.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
b327fb13b08f74b472800b700439c39d  elfutils-libelf-devel-0.94.1-2.i386.rpm

ia64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
148e0a5469f1808517416a0b8e319c48  elfutils-0.94.1-2.ia64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
edda45ae94832daec035f16fad0ae1cf  elfutils-debuginfo-0.94.1-2.ia64.rpm
d69aa822ad4a73e1796fb699285a3e16  elfutils-devel-0.94.1-2.ia64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
4981bc501ca8ede3a23c6ebf469f85b3  elfutils-libelf-0.94.1-2.ia64.rpm
8b9a5084a9c8f34b94198908bab6b6a2  elfutils-libelf-devel-0.94.1-2.ia64.rpm

ppc:
b9341cf90ec0737298a7e57d6a57b593  elfutils-0.94.1-2.ppc.rpm
037d2690cc56966149c2a3b2ba8e4885  elfutils-0.94.1-2.ppc64.rpm
75a4d805f6f4bc5bc01408429082775e  elfutils-debuginfo-0.94.1-2.ppc.rpm
33e5662958e13b7f448bc9863e375838  elfutils-debuginfo-0.94.1-2.ppc64.rpm
36398c56fe8adca7e4fdf4f084d513d4  elfutils-devel-0.94.1-2.ppc.rpm
d2c559b82e34b035c2f0864b34f56fa9  elfutils-libelf-0.94.1-2.ppc.rpm
9e94d133ca19169f88f364e483bba629  elfutils-libelf-0.94.1-2.ppc64.rpm
958ca58a79551292277ae448a01c5e01  elfutils-libelf-devel-0.94.1-2.ppc.rpm

s390:
a66109327605d7652f5cca2f6edc4c9c  elfutils-0.94.1-2.s390.rpm
36974e8ef9add022fa300041e8ce7529  elfutils-debuginfo-0.94.1-2.s390.rpm
bb297fba4cb392fff25d2982f924ab81  elfutils-devel-0.94.1-2.s390.rpm
92619133e3d38c362c540520573b39da  elfutils-libelf-0.94.1-2.s390.rpm
390fb07654eb89b5f43930720c419f98  elfutils-libelf-devel-0.94.1-2.s390.rpm

s390x:
a66109327605d7652f5cca2f6edc4c9c  elfutils-0.94.1-2.s390.rpm
a5498050a32775173fc9ea3faa6dfd9d  elfutils-0.94.1-2.s390x.rpm
36974e8ef9add022fa300041e8ce7529  elfutils-debuginfo-0.94.1-2.s390.rpm
a2d5048fcc7a763321eaf50eed9eb1a6  elfutils-debuginfo-0.94.1-2.s390x.rpm
dc2cc5075dbda8c07108d7b5e60c7cdf  elfutils-devel-0.94.1-2.s390x.rpm
92619133e3d38c362c540520573b39da  elfutils-libelf-0.94.1-2.s390.rpm
82431bc3f0c38f026d192b15b5f0d8ea  elfutils-libelf-0.94.1-2.s390x.rpm
da86201bdfedb1bc639cd033e28601ad  elfutils-libelf-devel-0.94.1-2.s390x.rpm

x86_64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
55c216e57fdf0edf3623cdadd814456e  elfutils-0.94.1-2.x86_64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
f389c86cba1e5fbda8d1798ecc32d142  elfutils-debuginfo-0.94.1-2.x86_64.rpm
921e1675d0c270e6f8e20a7413a65955  elfutils-devel-0.94.1-2.x86_64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
5516fefe4b2c4ec3dd491cdc09f1f153  elfutils-libelf-0.94.1-2.x86_64.rpm
85aa5c18b57bcd149b074092e77aa172  elfutils-libelf-devel-0.94.1-2.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/elfutils-0.94.1-2.src.rpm
f9c89885daf3d51a699b99db4855b33c  elfutils-0.94.1-2.src.rpm

i386:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
bdfc7c99932291ae6ab742fd60ae0ca0  elfutils-devel-0.94.1-2.i386.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
b327fb13b08f74b472800b700439c39d  elfutils-libelf-devel-0.94.1-2.i386.rpm

x86_64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
55c216e57fdf0edf3623cdadd814456e  elfutils-0.94.1-2.x86_64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
f389c86cba1e5fbda8d1798ecc32d142  elfutils-debuginfo-0.94.1-2.x86_64.rpm
921e1675d0c270e6f8e20a7413a65955  elfutils-devel-0.94.1-2.x86_64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
5516fefe4b2c4ec3dd491cdc09f1f153  elfutils-libelf-0.94.1-2.x86_64.rpm
85aa5c18b57bcd149b074092e77aa172  elfutils-libelf-devel-0.94.1-2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/elfutils-0.94.1-2.src.rpm
f9c89885daf3d51a699b99db4855b33c  elfutils-0.94.1-2.src.rpm

i386:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
bdfc7c99932291ae6ab742fd60ae0ca0  elfutils-devel-0.94.1-2.i386.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
b327fb13b08f74b472800b700439c39d  elfutils-libelf-devel-0.94.1-2.i386.rpm

ia64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
148e0a5469f1808517416a0b8e319c48  elfutils-0.94.1-2.ia64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
edda45ae94832daec035f16fad0ae1cf  elfutils-debuginfo-0.94.1-2.ia64.rpm
d69aa822ad4a73e1796fb699285a3e16  elfutils-devel-0.94.1-2.ia64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
4981bc501ca8ede3a23c6ebf469f85b3  elfutils-libelf-0.94.1-2.ia64.rpm
8b9a5084a9c8f34b94198908bab6b6a2  elfutils-libelf-devel-0.94.1-2.ia64.rpm

x86_64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
55c216e57fdf0edf3623cdadd814456e  elfutils-0.94.1-2.x86_64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
f389c86cba1e5fbda8d1798ecc32d142  elfutils-debuginfo-0.94.1-2.x86_64.rpm
921e1675d0c270e6f8e20a7413a65955  elfutils-devel-0.94.1-2.x86_64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
5516fefe4b2c4ec3dd491cdc09f1f153  elfutils-libelf-0.94.1-2.x86_64.rpm
85aa5c18b57bcd149b074092e77aa172  elfutils-libelf-devel-0.94.1-2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/elfutils-0.94.1-2.src.rpm
f9c89885daf3d51a699b99db4855b33c  elfutils-0.94.1-2.src.rpm

i386:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
bdfc7c99932291ae6ab742fd60ae0ca0  elfutils-devel-0.94.1-2.i386.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
b327fb13b08f74b472800b700439c39d  elfutils-libelf-devel-0.94.1-2.i386.rpm

ia64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
148e0a5469f1808517416a0b8e319c48  elfutils-0.94.1-2.ia64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
edda45ae94832daec035f16fad0ae1cf  elfutils-debuginfo-0.94.1-2.ia64.rpm
d69aa822ad4a73e1796fb699285a3e16  elfutils-devel-0.94.1-2.ia64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
4981bc501ca8ede3a23c6ebf469f85b3  elfutils-libelf-0.94.1-2.ia64.rpm
8b9a5084a9c8f34b94198908bab6b6a2  elfutils-libelf-devel-0.94.1-2.ia64.rpm

x86_64:
aff3e63cdad846aa2d8f866ae517c388  elfutils-0.94.1-2.i386.rpm
55c216e57fdf0edf3623cdadd814456e  elfutils-0.94.1-2.x86_64.rpm
7b39a06ce634c2905b419a97c48f0b42  elfutils-debuginfo-0.94.1-2.i386.rpm
f389c86cba1e5fbda8d1798ecc32d142  elfutils-debuginfo-0.94.1-2.x86_64.rpm
921e1675d0c270e6f8e20a7413a65955  elfutils-devel-0.94.1-2.x86_64.rpm
676234c6860bfddc964ef7c9ad15c7f3  elfutils-libelf-0.94.1-2.i386.rpm
5516fefe4b2c4ec3dd491cdc09f1f153  elfutils-libelf-0.94.1-2.x86_64.rpm
85aa5c18b57bcd149b074092e77aa172  elfutils-libelf-devel-0.94.1-2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFEv4NvXlSAg2UNWIIRAqJqAKDC1zPip3KgakhLsFVOy4yBztYo3gCgtqgI
Fi1xbcIXOFWS8WwpeDzk0hY=
=g9+K
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Low: elfutils security update
Advisory ID:       RHSA-2006:0354-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2006-0354.html
Issue date:        2006-08-10
Updated on:        2006-08-10
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2005-1704 
- - ---------------------------------------------------------------------

1. Summary:

Updated elfutils packages that address a minor security issue and various
other issues are now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The elfutils packages contain a number of utility programs and libraries
related to the creation and maintenance of executable code.

The elfutils packages that originally shipped with Red Hat Enterprise Linux 4
were GPL-licensed versions which lacked some functionality. Previous
updates provided fully functional versions of elfutils only under the OSL
license. This update provides a fully functional, GPL-licensed version of
elfutils. 

In the OSL-licensed elfutils versions provided in previous updates, some
tools could sometimes crash when given corrupted input files.  (CVE-2005-1704)

Also, when the eu-strip tool was used to create separate debuginfo files
from relocatable objects such as kernel modules (.ko), the resulting
debuginfo files (.ko.debug) were sometimes corrupted.  Both of these
problems are fixed in the new version.

Users of elfutils should upgrade to these updated packages, which resolve
these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate.  The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. Bug IDs fixed (http://bugzilla.redhat.com/):

156342 - eu-strip mangles separate debuginfo with relocation sections
159888 - CVE-2005-1704 Integer overflow in libelf
186992 - Elfutils license upgrade

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/elfutils-0.97.1-3.src.rpm
be92076aa98203d3d1a31764e8c55fe8  elfutils-0.97.1-3.src.rpm

i386:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
597fab4861e21558ee5241391d94c29e  elfutils-devel-0.97.1-3.i386.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
8d395168cffc2d3d9666b6741208115a  elfutils-libelf-devel-0.97.1-3.i386.rpm

ia64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
75c6bb5c1105e5182e9bb5f60039a875  elfutils-0.97.1-3.ia64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
00ba981a8897e990149319d38b202198  elfutils-debuginfo-0.97.1-3.ia64.rpm
5ab55fb1b7b1fdc890beee2246ae000e  elfutils-devel-0.97.1-3.ia64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
3452f9dc057e0b921cef882189118c61  elfutils-libelf-0.97.1-3.ia64.rpm
dfb803971bd78e169c3f22cb903daae9  elfutils-libelf-devel-0.97.1-3.ia64.rpm

ppc:
2680998fa90eb10b82018054d7523d95  elfutils-0.97.1-3.ppc.rpm
5bd8535f6dbba9548a9263349d3f78e3  elfutils-0.97.1-3.ppc64.rpm
8bf644dd1a625367539033ee3d42a576  elfutils-debuginfo-0.97.1-3.ppc.rpm
d00483b7efb0503e15d4ad239b76301c  elfutils-debuginfo-0.97.1-3.ppc64.rpm
c068b099c58942fc09b56a4bf63a4836  elfutils-devel-0.97.1-3.ppc.rpm
37c1b4884a178dcc69e58ecdbd4857ee  elfutils-libelf-0.97.1-3.ppc.rpm
91aaa5da12acc4ea47504c8e6760ee54  elfutils-libelf-0.97.1-3.ppc64.rpm
06a68c04286bf1a1167ffcaf9fe83585  elfutils-libelf-devel-0.97.1-3.ppc.rpm

s390:
77b2c7b6229c5a3f92856dbe75cbfab8  elfutils-0.97.1-3.s390.rpm
5d68e76fbe83443f5b187302ad47d787  elfutils-debuginfo-0.97.1-3.s390.rpm
86683249da3f5f1108ab2d1136fd3452  elfutils-devel-0.97.1-3.s390.rpm
d6e3f9ca8ce95cb5328cfff6bd2d5f45  elfutils-libelf-0.97.1-3.s390.rpm
0b24693676bf6e948de7172369aba13e  elfutils-libelf-devel-0.97.1-3.s390.rpm

s390x:
77b2c7b6229c5a3f92856dbe75cbfab8  elfutils-0.97.1-3.s390.rpm
6c65023b352b3e1c05667fe3e849e893  elfutils-0.97.1-3.s390x.rpm
5d68e76fbe83443f5b187302ad47d787  elfutils-debuginfo-0.97.1-3.s390.rpm
755c49447187e1a02106d954d8d25ae7  elfutils-debuginfo-0.97.1-3.s390x.rpm
2c3b1fb515c57f00417176242843bce6  elfutils-devel-0.97.1-3.s390x.rpm
d6e3f9ca8ce95cb5328cfff6bd2d5f45  elfutils-libelf-0.97.1-3.s390.rpm
cb42d361bfa5374f64623ed8a1d2c70c  elfutils-libelf-0.97.1-3.s390x.rpm
404801004e0dc22196bdb80acfa37bc1  elfutils-libelf-devel-0.97.1-3.s390x.rpm

x86_64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
921094a1e8f8febbacc1b24ce733fa61  elfutils-0.97.1-3.x86_64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
fd0737cf83da138e82db51ffc8fb3ffb  elfutils-debuginfo-0.97.1-3.x86_64.rpm
3f54f71891a4f96530f93c815e8169f7  elfutils-devel-0.97.1-3.x86_64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
fd37a6cb30a57eb5a5e483cfec7506ba  elfutils-libelf-0.97.1-3.x86_64.rpm
571be987e0f3726db8309bdc99d00941  elfutils-libelf-devel-0.97.1-3.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/elfutils-0.97.1-3.src.rpm
be92076aa98203d3d1a31764e8c55fe8  elfutils-0.97.1-3.src.rpm

i386:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
597fab4861e21558ee5241391d94c29e  elfutils-devel-0.97.1-3.i386.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
8d395168cffc2d3d9666b6741208115a  elfutils-libelf-devel-0.97.1-3.i386.rpm

x86_64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
921094a1e8f8febbacc1b24ce733fa61  elfutils-0.97.1-3.x86_64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
fd0737cf83da138e82db51ffc8fb3ffb  elfutils-debuginfo-0.97.1-3.x86_64.rpm
3f54f71891a4f96530f93c815e8169f7  elfutils-devel-0.97.1-3.x86_64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
fd37a6cb30a57eb5a5e483cfec7506ba  elfutils-libelf-0.97.1-3.x86_64.rpm
571be987e0f3726db8309bdc99d00941  elfutils-libelf-devel-0.97.1-3.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/elfutils-0.97.1-3.src.rpm
be92076aa98203d3d1a31764e8c55fe8  elfutils-0.97.1-3.src.rpm

i386:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
597fab4861e21558ee5241391d94c29e  elfutils-devel-0.97.1-3.i386.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
8d395168cffc2d3d9666b6741208115a  elfutils-libelf-devel-0.97.1-3.i386.rpm

ia64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
75c6bb5c1105e5182e9bb5f60039a875  elfutils-0.97.1-3.ia64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
00ba981a8897e990149319d38b202198  elfutils-debuginfo-0.97.1-3.ia64.rpm
5ab55fb1b7b1fdc890beee2246ae000e  elfutils-devel-0.97.1-3.ia64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
3452f9dc057e0b921cef882189118c61  elfutils-libelf-0.97.1-3.ia64.rpm
dfb803971bd78e169c3f22cb903daae9  elfutils-libelf-devel-0.97.1-3.ia64.rpm

x86_64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
921094a1e8f8febbacc1b24ce733fa61  elfutils-0.97.1-3.x86_64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
fd0737cf83da138e82db51ffc8fb3ffb  elfutils-debuginfo-0.97.1-3.x86_64.rpm
3f54f71891a4f96530f93c815e8169f7  elfutils-devel-0.97.1-3.x86_64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
fd37a6cb30a57eb5a5e483cfec7506ba  elfutils-libelf-0.97.1-3.x86_64.rpm
571be987e0f3726db8309bdc99d00941  elfutils-libelf-devel-0.97.1-3.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/elfutils-0.97.1-3.src.rpm
be92076aa98203d3d1a31764e8c55fe8  elfutils-0.97.1-3.src.rpm

i386:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
597fab4861e21558ee5241391d94c29e  elfutils-devel-0.97.1-3.i386.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
8d395168cffc2d3d9666b6741208115a  elfutils-libelf-devel-0.97.1-3.i386.rpm

ia64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
75c6bb5c1105e5182e9bb5f60039a875  elfutils-0.97.1-3.ia64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
00ba981a8897e990149319d38b202198  elfutils-debuginfo-0.97.1-3.ia64.rpm
5ab55fb1b7b1fdc890beee2246ae000e  elfutils-devel-0.97.1-3.ia64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
3452f9dc057e0b921cef882189118c61  elfutils-libelf-0.97.1-3.ia64.rpm
dfb803971bd78e169c3f22cb903daae9  elfutils-libelf-devel-0.97.1-3.ia64.rpm

x86_64:
156158f3b94caa1b50a50bf879c17eb7  elfutils-0.97.1-3.i386.rpm
921094a1e8f8febbacc1b24ce733fa61  elfutils-0.97.1-3.x86_64.rpm
a4e9411f61be01871bbeb43cf9e48b23  elfutils-debuginfo-0.97.1-3.i386.rpm
fd0737cf83da138e82db51ffc8fb3ffb  elfutils-debuginfo-0.97.1-3.x86_64.rpm
3f54f71891a4f96530f93c815e8169f7  elfutils-devel-0.97.1-3.x86_64.rpm
68118aabeacdefcb65fb5134908e2ed0  elfutils-libelf-0.97.1-3.i386.rpm
fd37a6cb30a57eb5a5e483cfec7506ba  elfutils-libelf-0.97.1-3.x86_64.rpm
571be987e0f3726db8309bdc99d00941  elfutils-libelf-devel-0.97.1-3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFE26ZOXlSAg2UNWIIRAkunAKCiv1pjEmH6L22MpTsPjFN3kVPVdgCgsmJq
dSH4qtgVHIfE9ERGiiYuvbg=
=8J5R
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBROkokSh9+71yA2DNAQIXlQP/XlfwtTqDDqW4D5SfkDNESVY9lTMTx+Xi
xdRlxeCCIlzcdZunPzj1giqZ26O5Jn73bQUa6dNywlIEiinVLxrWsvhGi32oNuVU
HdfehBwlla96HBCDdVbcWWd9NenWwSUs/vBEMEmfxEDCe/l6ID06fN0uyI7qFiWi
rJOTGZ4bLsQ=
=5Y/R
-----END PGP SIGNATURE-----