-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2007.0413 -- [UNIX/Linux][RedHat]
                    Important: kdebase security update
                               14 June 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              KDE
                      Adobe Flash Player
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux 5
                      Red Hat Enterprise Linux 4
                      Red Hat Enterprise Linux 3
                      UNIX variants (UNIX, Linux, OSX)
Impact:               Read-only Data Access
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-2022

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0494.html

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Red Hat. It is recommended that administrators
         running KDE or Adobe Flash Player check for an updated version of
         the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: kdebase security update
Advisory ID:       RHSA-2007:0494-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0494.html
Issue date:        2007-06-13
Updated on:        2007-06-13
Product:           Red Hat Enterprise Linux
Keywords:          adobe flash
CVE Names:         CVE-2007-2022 
- - ---------------------------------------------------------------------

1. Summary:

Updated kdebase packages that resolve an interaction security issue with
Adobe Flash Player are now available.

This update has been rated as having important security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The kdebase packages provide the core applications for KDE, the K Desktop
Environment. These core packages include Konqueror, the web browser and
file manager. 

A problem with the interaction between the Flash Player and the Konqueror
web browser was found. The problem could lead to key presses leaking to the
Flash Player applet instead of the browser (CVE-2007-2022).

Users of Konqueror who have installed the Adobe Flash Player plugin should
upgrade to these updated packages, which contain a patch provided by Dirk
Müller that protects against this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

243617 - CVE-2007-2022 kdebase3 flash-player interaction problem

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm
c31f4d2bbfcf759d4c38bdde06f992eb  kdebase-3.1.3-5.16.src.rpm

i386:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
e0dc3f58ce67381f194db22a0758de0c  kdebase-devel-3.1.3-5.16.i386.rpm

ia64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
45df8cf839f43893823ba3b2259f04f2  kdebase-3.1.3-5.16.ia64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
72426436d5549ea4e71b03b1fb88658a  kdebase-debuginfo-3.1.3-5.16.ia64.rpm
b6796be1d8c516c187435617eb15fcf9  kdebase-devel-3.1.3-5.16.ia64.rpm

ppc:
647626d0761ac03c6e14cbbf25da2606  kdebase-3.1.3-5.16.ppc.rpm
96d96663d50d7d1f1b89fabb92543262  kdebase-3.1.3-5.16.ppc64.rpm
1f8871259372be1c7aeab78793746104  kdebase-debuginfo-3.1.3-5.16.ppc.rpm
74274e79fa0e55048167e8f3e959c10b  kdebase-debuginfo-3.1.3-5.16.ppc64.rpm
47ce98cad930a9e3a2a61c9ebc40474e  kdebase-devel-3.1.3-5.16.ppc.rpm

s390:
8db588cace7b8efb6b1b29750e2269ba  kdebase-3.1.3-5.16.s390.rpm
b81816c21d793fd9707f815f2a02d411  kdebase-debuginfo-3.1.3-5.16.s390.rpm
560c98fa0ec567751a0d64cf1f132a52  kdebase-devel-3.1.3-5.16.s390.rpm

s390x:
8db588cace7b8efb6b1b29750e2269ba  kdebase-3.1.3-5.16.s390.rpm
fa69c69d40d6a9addcc74b9647940b45  kdebase-3.1.3-5.16.s390x.rpm
b81816c21d793fd9707f815f2a02d411  kdebase-debuginfo-3.1.3-5.16.s390.rpm
826646ac5fda086433133e2a02b8e0cd  kdebase-debuginfo-3.1.3-5.16.s390x.rpm
061380835c7ac56cbb22854f34892008  kdebase-devel-3.1.3-5.16.s390x.rpm

x86_64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
28d8fc17fcaf1186be090059bd4e4fb2  kdebase-3.1.3-5.16.x86_64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
2cd293e4520537f784793b74d6535a48  kdebase-debuginfo-3.1.3-5.16.x86_64.rpm
2e08c96c8fc4f0e9788c2294421ddfeb  kdebase-devel-3.1.3-5.16.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm
c31f4d2bbfcf759d4c38bdde06f992eb  kdebase-3.1.3-5.16.src.rpm

i386:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
e0dc3f58ce67381f194db22a0758de0c  kdebase-devel-3.1.3-5.16.i386.rpm

x86_64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
28d8fc17fcaf1186be090059bd4e4fb2  kdebase-3.1.3-5.16.x86_64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
2cd293e4520537f784793b74d6535a48  kdebase-debuginfo-3.1.3-5.16.x86_64.rpm
2e08c96c8fc4f0e9788c2294421ddfeb  kdebase-devel-3.1.3-5.16.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm
c31f4d2bbfcf759d4c38bdde06f992eb  kdebase-3.1.3-5.16.src.rpm

i386:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
e0dc3f58ce67381f194db22a0758de0c  kdebase-devel-3.1.3-5.16.i386.rpm

ia64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
45df8cf839f43893823ba3b2259f04f2  kdebase-3.1.3-5.16.ia64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
72426436d5549ea4e71b03b1fb88658a  kdebase-debuginfo-3.1.3-5.16.ia64.rpm
b6796be1d8c516c187435617eb15fcf9  kdebase-devel-3.1.3-5.16.ia64.rpm

x86_64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
28d8fc17fcaf1186be090059bd4e4fb2  kdebase-3.1.3-5.16.x86_64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
2cd293e4520537f784793b74d6535a48  kdebase-debuginfo-3.1.3-5.16.x86_64.rpm
2e08c96c8fc4f0e9788c2294421ddfeb  kdebase-devel-3.1.3-5.16.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm
c31f4d2bbfcf759d4c38bdde06f992eb  kdebase-3.1.3-5.16.src.rpm

i386:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
e0dc3f58ce67381f194db22a0758de0c  kdebase-devel-3.1.3-5.16.i386.rpm

ia64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
45df8cf839f43893823ba3b2259f04f2  kdebase-3.1.3-5.16.ia64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
72426436d5549ea4e71b03b1fb88658a  kdebase-debuginfo-3.1.3-5.16.ia64.rpm
b6796be1d8c516c187435617eb15fcf9  kdebase-devel-3.1.3-5.16.ia64.rpm

x86_64:
2c339d137bff0e3af3e85b09ddfa5a93  kdebase-3.1.3-5.16.i386.rpm
28d8fc17fcaf1186be090059bd4e4fb2  kdebase-3.1.3-5.16.x86_64.rpm
1f54fdec47ba48d7f66b9384b5c326e3  kdebase-debuginfo-3.1.3-5.16.i386.rpm
2cd293e4520537f784793b74d6535a48  kdebase-debuginfo-3.1.3-5.16.x86_64.rpm
2e08c96c8fc4f0e9788c2294421ddfeb  kdebase-devel-3.1.3-5.16.x86_64.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm
b7a15015df6976ff841b4efa7293996f  kdebase-3.3.1-5.19.rhel4.src.rpm

i386:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
adab781645d9c252da6829348bd16577  kdebase-devel-3.3.1-5.19.rhel4.i386.rpm

ia64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
c9f1cf487949778e60c69a454ed74f62  kdebase-3.3.1-5.19.rhel4.ia64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
8b9b3d16dcd62b998d764eb04a687e44  kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm
a44829cb24621cae44d196c41ccbf074  kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm

ppc:
481161e9f95e8c9a055f79d9344a0be0  kdebase-3.3.1-5.19.rhel4.ppc.rpm
2b26bb89a9e84a9854501e75378c191b  kdebase-3.3.1-5.19.rhel4.ppc64.rpm
28f9481e73c07cdf9dd9ce6d3537ca55  kdebase-debuginfo-3.3.1-5.19.rhel4.ppc.rpm
007963a9914f9c28f7555158fe3f3250  kdebase-debuginfo-3.3.1-5.19.rhel4.ppc64.rpm
753708f22dec8cf9f6590f63e1ced265  kdebase-devel-3.3.1-5.19.rhel4.ppc.rpm

s390:
e79de4fb8e6e42723a71db2f923e23dd  kdebase-3.3.1-5.19.rhel4.s390.rpm
7599418ac4dd1e915380ff8a07dbee67  kdebase-debuginfo-3.3.1-5.19.rhel4.s390.rpm
25193b259ae6c673fa266fe5cba8fcec  kdebase-devel-3.3.1-5.19.rhel4.s390.rpm

s390x:
e79de4fb8e6e42723a71db2f923e23dd  kdebase-3.3.1-5.19.rhel4.s390.rpm
51a4573a667b536d1f441f2dd2a0aa04  kdebase-3.3.1-5.19.rhel4.s390x.rpm
7599418ac4dd1e915380ff8a07dbee67  kdebase-debuginfo-3.3.1-5.19.rhel4.s390.rpm
f1b8e9bb263554609f8d75d98bc3c79d  kdebase-debuginfo-3.3.1-5.19.rhel4.s390x.rpm
4e28d436117f75c86490d3b6bfe1d420  kdebase-devel-3.3.1-5.19.rhel4.s390x.rpm

x86_64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
e391179c0b95aa0ddeeb54a2ad86e531  kdebase-3.3.1-5.19.rhel4.x86_64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
571737e00689175ffcca46922ba7c8ee  kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm
65d2e53134702886ab9839ef6bbb59cc  kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm
b7a15015df6976ff841b4efa7293996f  kdebase-3.3.1-5.19.rhel4.src.rpm

i386:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
adab781645d9c252da6829348bd16577  kdebase-devel-3.3.1-5.19.rhel4.i386.rpm

x86_64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
e391179c0b95aa0ddeeb54a2ad86e531  kdebase-3.3.1-5.19.rhel4.x86_64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
571737e00689175ffcca46922ba7c8ee  kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm
65d2e53134702886ab9839ef6bbb59cc  kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm
b7a15015df6976ff841b4efa7293996f  kdebase-3.3.1-5.19.rhel4.src.rpm

i386:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
adab781645d9c252da6829348bd16577  kdebase-devel-3.3.1-5.19.rhel4.i386.rpm

ia64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
c9f1cf487949778e60c69a454ed74f62  kdebase-3.3.1-5.19.rhel4.ia64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
8b9b3d16dcd62b998d764eb04a687e44  kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm
a44829cb24621cae44d196c41ccbf074  kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm

x86_64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
e391179c0b95aa0ddeeb54a2ad86e531  kdebase-3.3.1-5.19.rhel4.x86_64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
571737e00689175ffcca46922ba7c8ee  kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm
65d2e53134702886ab9839ef6bbb59cc  kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm
b7a15015df6976ff841b4efa7293996f  kdebase-3.3.1-5.19.rhel4.src.rpm

i386:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
adab781645d9c252da6829348bd16577  kdebase-devel-3.3.1-5.19.rhel4.i386.rpm

ia64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
c9f1cf487949778e60c69a454ed74f62  kdebase-3.3.1-5.19.rhel4.ia64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
8b9b3d16dcd62b998d764eb04a687e44  kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm
a44829cb24621cae44d196c41ccbf074  kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm

x86_64:
94a27d51e68dea0f24d8b9e09ad34fec  kdebase-3.3.1-5.19.rhel4.i386.rpm
e391179c0b95aa0ddeeb54a2ad86e531  kdebase-3.3.1-5.19.rhel4.x86_64.rpm
6949f7a92c03b12f8a469debc3281c7e  kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm
571737e00689175ffcca46922ba7c8ee  kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm
65d2e53134702886ab9839ef6bbb59cc  kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm
423a7e7354a7305d3c824be12dd5d884  kdebase-3.5.4-13.6.el5.src.rpm

i386:
c1832d13f2e648a6a87fcd0dfb2b46bb  kdebase-3.5.4-13.6.el5.i386.rpm
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm

x86_64:
c1832d13f2e648a6a87fcd0dfb2b46bb  kdebase-3.5.4-13.6.el5.i386.rpm
ebf43d3a87ed21c01d28200427c4e05c  kdebase-3.5.4-13.6.el5.x86_64.rpm
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm
115780997a93804a514a5718a14a664c  kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm
423a7e7354a7305d3c824be12dd5d884  kdebase-3.5.4-13.6.el5.src.rpm

i386:
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm
16ee8912e23c6bef99f3deb5b19e1827  kdebase-devel-3.5.4-13.6.el5.i386.rpm

x86_64:
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm
115780997a93804a514a5718a14a664c  kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm
16ee8912e23c6bef99f3deb5b19e1827  kdebase-devel-3.5.4-13.6.el5.i386.rpm
4fa7ba4abe5f2a52fbc17bedcecd0b47  kdebase-devel-3.5.4-13.6.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm
423a7e7354a7305d3c824be12dd5d884  kdebase-3.5.4-13.6.el5.src.rpm

i386:
c1832d13f2e648a6a87fcd0dfb2b46bb  kdebase-3.5.4-13.6.el5.i386.rpm
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm
16ee8912e23c6bef99f3deb5b19e1827  kdebase-devel-3.5.4-13.6.el5.i386.rpm

ia64:
69c116568ded83d4589e83e8ec5f8410  kdebase-3.5.4-13.6.el5.ia64.rpm
f0afd3c9b187616f006b5c8a621bb203  kdebase-debuginfo-3.5.4-13.6.el5.ia64.rpm
683531a8d637edc330f8df1b9e46a677  kdebase-devel-3.5.4-13.6.el5.ia64.rpm

ppc:
8e624ad8eb5d1cb1e415eac1312c3ea3  kdebase-3.5.4-13.6.el5.ppc.rpm
200635b74b5352b5f4ef6020a567d9f2  kdebase-3.5.4-13.6.el5.ppc64.rpm
04510c9073b8b671522802541bd0a658  kdebase-debuginfo-3.5.4-13.6.el5.ppc.rpm
56deee3c0a28f078e063c977a055d50a  kdebase-debuginfo-3.5.4-13.6.el5.ppc64.rpm
55268c2c549b4271d8c34c279adea17a  kdebase-devel-3.5.4-13.6.el5.ppc.rpm
b0e48827d40cd21da0355bb05ded649d  kdebase-devel-3.5.4-13.6.el5.ppc64.rpm

s390x:
dc3a674d66c136d78e6df81bdd3e9f25  kdebase-3.5.4-13.6.el5.s390.rpm
4ac8d7ca86a129905038cf1fbf912eb5  kdebase-3.5.4-13.6.el5.s390x.rpm
1b03f51a38fdaa6e9a85f3d5d5f6bf50  kdebase-debuginfo-3.5.4-13.6.el5.s390.rpm
25b959cff3f4c08d1c94c7f452bf3475  kdebase-debuginfo-3.5.4-13.6.el5.s390x.rpm
567c25cb274e9a69ecf6c8c0ebca0339  kdebase-devel-3.5.4-13.6.el5.s390.rpm
f6ac73f9a500dc0103531cf0dc8d7b2c  kdebase-devel-3.5.4-13.6.el5.s390x.rpm

x86_64:
c1832d13f2e648a6a87fcd0dfb2b46bb  kdebase-3.5.4-13.6.el5.i386.rpm
ebf43d3a87ed21c01d28200427c4e05c  kdebase-3.5.4-13.6.el5.x86_64.rpm
45a8ccb10373f690014a8caecd297f42  kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm
115780997a93804a514a5718a14a664c  kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm
16ee8912e23c6bef99f3deb5b19e1827  kdebase-devel-3.5.4-13.6.el5.i386.rpm
4fa7ba4abe5f2a52fbc17bedcecd0b47  kdebase-devel-3.5.4-13.6.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022
http://www.adobe.com/support/security/advisories/apsa07-03.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGcCssXlSAg2UNWIIRAlxSAJ9YpEoc+TJZyoST/c/X+2QMLJDTsQCgqobu
OcGnNTxaxntAg7gSLgFD5NM=
=+d5l
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRnCScCh9+71yA2DNAQLx1QP/VXsU9itIQcbp5GTXcm2SJhUUoP1FRU6Q
/4t7p0iO1xpeOJ5NSOqRb9afEHKtxpNy20wwTQIp+ApqSxAbV5oNJr78C8geazex
1G3p9YP5VXiGfXcho521mKUUWxHj0/lesLYprf4yYXqAIXfDI7drbL/CqfXRd4tF
uqUZJ0I2/C4=
=1rAb
-----END PGP SIGNATURE-----