Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2006.0489 -- [RedHat] Low: elfutils security update 21 August 2006 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: elfutils Publisher: Red Hat Operating System: Red Hat Desktop 3 Red Hat Enterprise Linux AS/ES/WS 3 Impact: Denial of Service Access: Existing Account CVE Names: CVE-2005-1704 Revision History: August 21 2006: Added Red Hat bulletin for version 4 July 21 2006: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: elfutils security update Advisory ID: RHSA-2006:0368-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0368.html Issue date: 2006-07-20 Updated on: 2006-07-20 Product: Red Hat Enterprise Linux Keywords: elfutils CVE Names: CVE-2005-1704 - - --------------------------------------------------------------------- 1. Summary: Updated elfutils packages that address a minor security issue and various other issues are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: The elfutils packages contain a number of utility programs and libraries related to the creation and maintenance of executable code. The elfutils packages that originally shipped with Red Hat Enterprise Linux 3 were GPL-licensed versions which lacked some functionality. Previous updates provided fully functional versions of elfutils only under the OSL license. This update provides a fully functional, GPL-licensed version of elfutils. In the OSL-licensed elfutils versions provided in previous updates, some tools could sometimes crash when given corrupted input files. (CVE-2005-1704) Also, when the eu-strip tool was used to create separate debuginfo files from relocatable objects such as kernel modules (.ko), the resulting debuginfo files (.ko.debug) were sometimes corrupted. Both of these problems are fixed in the new version. Users of elfutils should upgrade to these updated packages, which resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/): 159908 - CVE-2005-1704 Integer overflow in libelf 187507 - RHEL3 U8: Elfutils license upgrade 189114 - eu-strip mangles separate debuginfo with relocation sections 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/elfutils-0.94.1-2.src.rpm f9c89885daf3d51a699b99db4855b33c elfutils-0.94.1-2.src.rpm i386: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm bdfc7c99932291ae6ab742fd60ae0ca0 elfutils-devel-0.94.1-2.i386.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm b327fb13b08f74b472800b700439c39d elfutils-libelf-devel-0.94.1-2.i386.rpm ia64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 148e0a5469f1808517416a0b8e319c48 elfutils-0.94.1-2.ia64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm edda45ae94832daec035f16fad0ae1cf elfutils-debuginfo-0.94.1-2.ia64.rpm d69aa822ad4a73e1796fb699285a3e16 elfutils-devel-0.94.1-2.ia64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 4981bc501ca8ede3a23c6ebf469f85b3 elfutils-libelf-0.94.1-2.ia64.rpm 8b9a5084a9c8f34b94198908bab6b6a2 elfutils-libelf-devel-0.94.1-2.ia64.rpm ppc: b9341cf90ec0737298a7e57d6a57b593 elfutils-0.94.1-2.ppc.rpm 037d2690cc56966149c2a3b2ba8e4885 elfutils-0.94.1-2.ppc64.rpm 75a4d805f6f4bc5bc01408429082775e elfutils-debuginfo-0.94.1-2.ppc.rpm 33e5662958e13b7f448bc9863e375838 elfutils-debuginfo-0.94.1-2.ppc64.rpm 36398c56fe8adca7e4fdf4f084d513d4 elfutils-devel-0.94.1-2.ppc.rpm d2c559b82e34b035c2f0864b34f56fa9 elfutils-libelf-0.94.1-2.ppc.rpm 9e94d133ca19169f88f364e483bba629 elfutils-libelf-0.94.1-2.ppc64.rpm 958ca58a79551292277ae448a01c5e01 elfutils-libelf-devel-0.94.1-2.ppc.rpm s390: a66109327605d7652f5cca2f6edc4c9c elfutils-0.94.1-2.s390.rpm 36974e8ef9add022fa300041e8ce7529 elfutils-debuginfo-0.94.1-2.s390.rpm bb297fba4cb392fff25d2982f924ab81 elfutils-devel-0.94.1-2.s390.rpm 92619133e3d38c362c540520573b39da elfutils-libelf-0.94.1-2.s390.rpm 390fb07654eb89b5f43930720c419f98 elfutils-libelf-devel-0.94.1-2.s390.rpm s390x: a66109327605d7652f5cca2f6edc4c9c elfutils-0.94.1-2.s390.rpm a5498050a32775173fc9ea3faa6dfd9d elfutils-0.94.1-2.s390x.rpm 36974e8ef9add022fa300041e8ce7529 elfutils-debuginfo-0.94.1-2.s390.rpm a2d5048fcc7a763321eaf50eed9eb1a6 elfutils-debuginfo-0.94.1-2.s390x.rpm dc2cc5075dbda8c07108d7b5e60c7cdf elfutils-devel-0.94.1-2.s390x.rpm 92619133e3d38c362c540520573b39da elfutils-libelf-0.94.1-2.s390.rpm 82431bc3f0c38f026d192b15b5f0d8ea elfutils-libelf-0.94.1-2.s390x.rpm da86201bdfedb1bc639cd033e28601ad elfutils-libelf-devel-0.94.1-2.s390x.rpm x86_64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 55c216e57fdf0edf3623cdadd814456e elfutils-0.94.1-2.x86_64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm f389c86cba1e5fbda8d1798ecc32d142 elfutils-debuginfo-0.94.1-2.x86_64.rpm 921e1675d0c270e6f8e20a7413a65955 elfutils-devel-0.94.1-2.x86_64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 5516fefe4b2c4ec3dd491cdc09f1f153 elfutils-libelf-0.94.1-2.x86_64.rpm 85aa5c18b57bcd149b074092e77aa172 elfutils-libelf-devel-0.94.1-2.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/elfutils-0.94.1-2.src.rpm f9c89885daf3d51a699b99db4855b33c elfutils-0.94.1-2.src.rpm i386: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm bdfc7c99932291ae6ab742fd60ae0ca0 elfutils-devel-0.94.1-2.i386.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm b327fb13b08f74b472800b700439c39d elfutils-libelf-devel-0.94.1-2.i386.rpm x86_64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 55c216e57fdf0edf3623cdadd814456e elfutils-0.94.1-2.x86_64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm f389c86cba1e5fbda8d1798ecc32d142 elfutils-debuginfo-0.94.1-2.x86_64.rpm 921e1675d0c270e6f8e20a7413a65955 elfutils-devel-0.94.1-2.x86_64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 5516fefe4b2c4ec3dd491cdc09f1f153 elfutils-libelf-0.94.1-2.x86_64.rpm 85aa5c18b57bcd149b074092e77aa172 elfutils-libelf-devel-0.94.1-2.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/elfutils-0.94.1-2.src.rpm f9c89885daf3d51a699b99db4855b33c elfutils-0.94.1-2.src.rpm i386: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm bdfc7c99932291ae6ab742fd60ae0ca0 elfutils-devel-0.94.1-2.i386.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm b327fb13b08f74b472800b700439c39d elfutils-libelf-devel-0.94.1-2.i386.rpm ia64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 148e0a5469f1808517416a0b8e319c48 elfutils-0.94.1-2.ia64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm edda45ae94832daec035f16fad0ae1cf elfutils-debuginfo-0.94.1-2.ia64.rpm d69aa822ad4a73e1796fb699285a3e16 elfutils-devel-0.94.1-2.ia64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 4981bc501ca8ede3a23c6ebf469f85b3 elfutils-libelf-0.94.1-2.ia64.rpm 8b9a5084a9c8f34b94198908bab6b6a2 elfutils-libelf-devel-0.94.1-2.ia64.rpm x86_64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 55c216e57fdf0edf3623cdadd814456e elfutils-0.94.1-2.x86_64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm f389c86cba1e5fbda8d1798ecc32d142 elfutils-debuginfo-0.94.1-2.x86_64.rpm 921e1675d0c270e6f8e20a7413a65955 elfutils-devel-0.94.1-2.x86_64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 5516fefe4b2c4ec3dd491cdc09f1f153 elfutils-libelf-0.94.1-2.x86_64.rpm 85aa5c18b57bcd149b074092e77aa172 elfutils-libelf-devel-0.94.1-2.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/elfutils-0.94.1-2.src.rpm f9c89885daf3d51a699b99db4855b33c elfutils-0.94.1-2.src.rpm i386: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm bdfc7c99932291ae6ab742fd60ae0ca0 elfutils-devel-0.94.1-2.i386.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm b327fb13b08f74b472800b700439c39d elfutils-libelf-devel-0.94.1-2.i386.rpm ia64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 148e0a5469f1808517416a0b8e319c48 elfutils-0.94.1-2.ia64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm edda45ae94832daec035f16fad0ae1cf elfutils-debuginfo-0.94.1-2.ia64.rpm d69aa822ad4a73e1796fb699285a3e16 elfutils-devel-0.94.1-2.ia64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 4981bc501ca8ede3a23c6ebf469f85b3 elfutils-libelf-0.94.1-2.ia64.rpm 8b9a5084a9c8f34b94198908bab6b6a2 elfutils-libelf-devel-0.94.1-2.ia64.rpm x86_64: aff3e63cdad846aa2d8f866ae517c388 elfutils-0.94.1-2.i386.rpm 55c216e57fdf0edf3623cdadd814456e elfutils-0.94.1-2.x86_64.rpm 7b39a06ce634c2905b419a97c48f0b42 elfutils-debuginfo-0.94.1-2.i386.rpm f389c86cba1e5fbda8d1798ecc32d142 elfutils-debuginfo-0.94.1-2.x86_64.rpm 921e1675d0c270e6f8e20a7413a65955 elfutils-devel-0.94.1-2.x86_64.rpm 676234c6860bfddc964ef7c9ad15c7f3 elfutils-libelf-0.94.1-2.i386.rpm 5516fefe4b2c4ec3dd491cdc09f1f153 elfutils-libelf-0.94.1-2.x86_64.rpm 85aa5c18b57bcd149b074092e77aa172 elfutils-libelf-devel-0.94.1-2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFEv4NvXlSAg2UNWIIRAqJqAKDC1zPip3KgakhLsFVOy4yBztYo3gCgtqgI Fi1xbcIXOFWS8WwpeDzk0hY= =g9+K - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Low: elfutils security update Advisory ID: RHSA-2006:0354-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0354.html Issue date: 2006-08-10 Updated on: 2006-08-10 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-1704 - - --------------------------------------------------------------------- 1. Summary: Updated elfutils packages that address a minor security issue and various other issues are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: The elfutils packages contain a number of utility programs and libraries related to the creation and maintenance of executable code. The elfutils packages that originally shipped with Red Hat Enterprise Linux 4 were GPL-licensed versions which lacked some functionality. Previous updates provided fully functional versions of elfutils only under the OSL license. This update provides a fully functional, GPL-licensed version of elfutils. In the OSL-licensed elfutils versions provided in previous updates, some tools could sometimes crash when given corrupted input files. (CVE-2005-1704) Also, when the eu-strip tool was used to create separate debuginfo files from relocatable objects such as kernel modules (.ko), the resulting debuginfo files (.ko.debug) were sometimes corrupted. Both of these problems are fixed in the new version. Users of elfutils should upgrade to these updated packages, which resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. If up2date fails to connect to Red Hat Network due to SSL Certificate Errors, you need to install a version of the up2date client with an updated certificate. The latest version of up2date is available from the Red Hat FTP site and may also be downloaded directly from the RHN website: https://rhn.redhat.com/help/latest-up2date.pxt 5. Bug IDs fixed (http://bugzilla.redhat.com/): 156342 - eu-strip mangles separate debuginfo with relocation sections 159888 - CVE-2005-1704 Integer overflow in libelf 186992 - Elfutils license upgrade 6. RPMs required: Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/elfutils-0.97.1-3.src.rpm be92076aa98203d3d1a31764e8c55fe8 elfutils-0.97.1-3.src.rpm i386: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 597fab4861e21558ee5241391d94c29e elfutils-devel-0.97.1-3.i386.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 8d395168cffc2d3d9666b6741208115a elfutils-libelf-devel-0.97.1-3.i386.rpm ia64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 75c6bb5c1105e5182e9bb5f60039a875 elfutils-0.97.1-3.ia64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 00ba981a8897e990149319d38b202198 elfutils-debuginfo-0.97.1-3.ia64.rpm 5ab55fb1b7b1fdc890beee2246ae000e elfutils-devel-0.97.1-3.ia64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 3452f9dc057e0b921cef882189118c61 elfutils-libelf-0.97.1-3.ia64.rpm dfb803971bd78e169c3f22cb903daae9 elfutils-libelf-devel-0.97.1-3.ia64.rpm ppc: 2680998fa90eb10b82018054d7523d95 elfutils-0.97.1-3.ppc.rpm 5bd8535f6dbba9548a9263349d3f78e3 elfutils-0.97.1-3.ppc64.rpm 8bf644dd1a625367539033ee3d42a576 elfutils-debuginfo-0.97.1-3.ppc.rpm d00483b7efb0503e15d4ad239b76301c elfutils-debuginfo-0.97.1-3.ppc64.rpm c068b099c58942fc09b56a4bf63a4836 elfutils-devel-0.97.1-3.ppc.rpm 37c1b4884a178dcc69e58ecdbd4857ee elfutils-libelf-0.97.1-3.ppc.rpm 91aaa5da12acc4ea47504c8e6760ee54 elfutils-libelf-0.97.1-3.ppc64.rpm 06a68c04286bf1a1167ffcaf9fe83585 elfutils-libelf-devel-0.97.1-3.ppc.rpm s390: 77b2c7b6229c5a3f92856dbe75cbfab8 elfutils-0.97.1-3.s390.rpm 5d68e76fbe83443f5b187302ad47d787 elfutils-debuginfo-0.97.1-3.s390.rpm 86683249da3f5f1108ab2d1136fd3452 elfutils-devel-0.97.1-3.s390.rpm d6e3f9ca8ce95cb5328cfff6bd2d5f45 elfutils-libelf-0.97.1-3.s390.rpm 0b24693676bf6e948de7172369aba13e elfutils-libelf-devel-0.97.1-3.s390.rpm s390x: 77b2c7b6229c5a3f92856dbe75cbfab8 elfutils-0.97.1-3.s390.rpm 6c65023b352b3e1c05667fe3e849e893 elfutils-0.97.1-3.s390x.rpm 5d68e76fbe83443f5b187302ad47d787 elfutils-debuginfo-0.97.1-3.s390.rpm 755c49447187e1a02106d954d8d25ae7 elfutils-debuginfo-0.97.1-3.s390x.rpm 2c3b1fb515c57f00417176242843bce6 elfutils-devel-0.97.1-3.s390x.rpm d6e3f9ca8ce95cb5328cfff6bd2d5f45 elfutils-libelf-0.97.1-3.s390.rpm cb42d361bfa5374f64623ed8a1d2c70c elfutils-libelf-0.97.1-3.s390x.rpm 404801004e0dc22196bdb80acfa37bc1 elfutils-libelf-devel-0.97.1-3.s390x.rpm x86_64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 921094a1e8f8febbacc1b24ce733fa61 elfutils-0.97.1-3.x86_64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm fd0737cf83da138e82db51ffc8fb3ffb elfutils-debuginfo-0.97.1-3.x86_64.rpm 3f54f71891a4f96530f93c815e8169f7 elfutils-devel-0.97.1-3.x86_64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm fd37a6cb30a57eb5a5e483cfec7506ba elfutils-libelf-0.97.1-3.x86_64.rpm 571be987e0f3726db8309bdc99d00941 elfutils-libelf-devel-0.97.1-3.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/elfutils-0.97.1-3.src.rpm be92076aa98203d3d1a31764e8c55fe8 elfutils-0.97.1-3.src.rpm i386: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 597fab4861e21558ee5241391d94c29e elfutils-devel-0.97.1-3.i386.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 8d395168cffc2d3d9666b6741208115a elfutils-libelf-devel-0.97.1-3.i386.rpm x86_64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 921094a1e8f8febbacc1b24ce733fa61 elfutils-0.97.1-3.x86_64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm fd0737cf83da138e82db51ffc8fb3ffb elfutils-debuginfo-0.97.1-3.x86_64.rpm 3f54f71891a4f96530f93c815e8169f7 elfutils-devel-0.97.1-3.x86_64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm fd37a6cb30a57eb5a5e483cfec7506ba elfutils-libelf-0.97.1-3.x86_64.rpm 571be987e0f3726db8309bdc99d00941 elfutils-libelf-devel-0.97.1-3.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/elfutils-0.97.1-3.src.rpm be92076aa98203d3d1a31764e8c55fe8 elfutils-0.97.1-3.src.rpm i386: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 597fab4861e21558ee5241391d94c29e elfutils-devel-0.97.1-3.i386.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 8d395168cffc2d3d9666b6741208115a elfutils-libelf-devel-0.97.1-3.i386.rpm ia64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 75c6bb5c1105e5182e9bb5f60039a875 elfutils-0.97.1-3.ia64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 00ba981a8897e990149319d38b202198 elfutils-debuginfo-0.97.1-3.ia64.rpm 5ab55fb1b7b1fdc890beee2246ae000e elfutils-devel-0.97.1-3.ia64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 3452f9dc057e0b921cef882189118c61 elfutils-libelf-0.97.1-3.ia64.rpm dfb803971bd78e169c3f22cb903daae9 elfutils-libelf-devel-0.97.1-3.ia64.rpm x86_64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 921094a1e8f8febbacc1b24ce733fa61 elfutils-0.97.1-3.x86_64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm fd0737cf83da138e82db51ffc8fb3ffb elfutils-debuginfo-0.97.1-3.x86_64.rpm 3f54f71891a4f96530f93c815e8169f7 elfutils-devel-0.97.1-3.x86_64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm fd37a6cb30a57eb5a5e483cfec7506ba elfutils-libelf-0.97.1-3.x86_64.rpm 571be987e0f3726db8309bdc99d00941 elfutils-libelf-devel-0.97.1-3.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/elfutils-0.97.1-3.src.rpm be92076aa98203d3d1a31764e8c55fe8 elfutils-0.97.1-3.src.rpm i386: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 597fab4861e21558ee5241391d94c29e elfutils-devel-0.97.1-3.i386.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 8d395168cffc2d3d9666b6741208115a elfutils-libelf-devel-0.97.1-3.i386.rpm ia64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 75c6bb5c1105e5182e9bb5f60039a875 elfutils-0.97.1-3.ia64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm 00ba981a8897e990149319d38b202198 elfutils-debuginfo-0.97.1-3.ia64.rpm 5ab55fb1b7b1fdc890beee2246ae000e elfutils-devel-0.97.1-3.ia64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm 3452f9dc057e0b921cef882189118c61 elfutils-libelf-0.97.1-3.ia64.rpm dfb803971bd78e169c3f22cb903daae9 elfutils-libelf-devel-0.97.1-3.ia64.rpm x86_64: 156158f3b94caa1b50a50bf879c17eb7 elfutils-0.97.1-3.i386.rpm 921094a1e8f8febbacc1b24ce733fa61 elfutils-0.97.1-3.x86_64.rpm a4e9411f61be01871bbeb43cf9e48b23 elfutils-debuginfo-0.97.1-3.i386.rpm fd0737cf83da138e82db51ffc8fb3ffb elfutils-debuginfo-0.97.1-3.x86_64.rpm 3f54f71891a4f96530f93c815e8169f7 elfutils-devel-0.97.1-3.x86_64.rpm 68118aabeacdefcb65fb5134908e2ed0 elfutils-libelf-0.97.1-3.i386.rpm fd37a6cb30a57eb5a5e483cfec7506ba elfutils-libelf-0.97.1-3.x86_64.rpm 571be987e0f3726db8309bdc99d00941 elfutils-libelf-devel-0.97.1-3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2006 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQFE26ZOXlSAg2UNWIIRAkunAKCiv1pjEmH6L22MpTsPjFN3kVPVdgCgsmJq dSH4qtgVHIfE9ERGiiYuvbg= =8J5R - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBROkokSh9+71yA2DNAQIXlQP/XlfwtTqDDqW4D5SfkDNESVY9lTMTx+Xi xdRlxeCCIlzcdZunPzj1giqZ26O5Jn73bQUa6dNywlIEiinVLxrWsvhGi32oNuVU HdfehBwlla96HBCDdVbcWWd9NenWwSUs/vBEMEmfxEDCe/l6ID06fN0uyI7qFiWi rJOTGZ4bLsQ= =5Y/R -----END PGP SIGNATURE-----