Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0413 -- [UNIX/Linux][RedHat] Important: kdebase security update 14 June 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: KDE Adobe Flash Player Publisher: Red Hat Operating System: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 3 UNIX variants (UNIX, Linux, OSX) Impact: Read-only Data Access Access: Remote/Unauthenticated CVE Names: CVE-2007-2022 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-0494.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running KDE or Adobe Flash Player check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: kdebase security update Advisory ID: RHSA-2007:0494-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0494.html Issue date: 2007-06-13 Updated on: 2007-06-13 Product: Red Hat Enterprise Linux Keywords: adobe flash CVE Names: CVE-2007-2022 - - --------------------------------------------------------------------- 1. Summary: Updated kdebase packages that resolve an interaction security issue with Adobe Flash Player are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: The kdebase packages provide the core applications for KDE, the K Desktop Environment. These core packages include Konqueror, the web browser and file manager. A problem with the interaction between the Flash Player and the Konqueror web browser was found. The problem could lead to key presses leaking to the Flash Player applet instead of the browser (CVE-2007-2022). Users of Konqueror who have installed the Adobe Flash Player plugin should upgrade to these updated packages, which contain a patch provided by Dirk Müller that protects against this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 243617 - CVE-2007-2022 kdebase3 flash-player interaction problem 6. RPMs required: Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm c31f4d2bbfcf759d4c38bdde06f992eb kdebase-3.1.3-5.16.src.rpm i386: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm e0dc3f58ce67381f194db22a0758de0c kdebase-devel-3.1.3-5.16.i386.rpm ia64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 45df8cf839f43893823ba3b2259f04f2 kdebase-3.1.3-5.16.ia64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 72426436d5549ea4e71b03b1fb88658a kdebase-debuginfo-3.1.3-5.16.ia64.rpm b6796be1d8c516c187435617eb15fcf9 kdebase-devel-3.1.3-5.16.ia64.rpm ppc: 647626d0761ac03c6e14cbbf25da2606 kdebase-3.1.3-5.16.ppc.rpm 96d96663d50d7d1f1b89fabb92543262 kdebase-3.1.3-5.16.ppc64.rpm 1f8871259372be1c7aeab78793746104 kdebase-debuginfo-3.1.3-5.16.ppc.rpm 74274e79fa0e55048167e8f3e959c10b kdebase-debuginfo-3.1.3-5.16.ppc64.rpm 47ce98cad930a9e3a2a61c9ebc40474e kdebase-devel-3.1.3-5.16.ppc.rpm s390: 8db588cace7b8efb6b1b29750e2269ba kdebase-3.1.3-5.16.s390.rpm b81816c21d793fd9707f815f2a02d411 kdebase-debuginfo-3.1.3-5.16.s390.rpm 560c98fa0ec567751a0d64cf1f132a52 kdebase-devel-3.1.3-5.16.s390.rpm s390x: 8db588cace7b8efb6b1b29750e2269ba kdebase-3.1.3-5.16.s390.rpm fa69c69d40d6a9addcc74b9647940b45 kdebase-3.1.3-5.16.s390x.rpm b81816c21d793fd9707f815f2a02d411 kdebase-debuginfo-3.1.3-5.16.s390.rpm 826646ac5fda086433133e2a02b8e0cd kdebase-debuginfo-3.1.3-5.16.s390x.rpm 061380835c7ac56cbb22854f34892008 kdebase-devel-3.1.3-5.16.s390x.rpm x86_64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 28d8fc17fcaf1186be090059bd4e4fb2 kdebase-3.1.3-5.16.x86_64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 2cd293e4520537f784793b74d6535a48 kdebase-debuginfo-3.1.3-5.16.x86_64.rpm 2e08c96c8fc4f0e9788c2294421ddfeb kdebase-devel-3.1.3-5.16.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm c31f4d2bbfcf759d4c38bdde06f992eb kdebase-3.1.3-5.16.src.rpm i386: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm e0dc3f58ce67381f194db22a0758de0c kdebase-devel-3.1.3-5.16.i386.rpm x86_64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 28d8fc17fcaf1186be090059bd4e4fb2 kdebase-3.1.3-5.16.x86_64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 2cd293e4520537f784793b74d6535a48 kdebase-debuginfo-3.1.3-5.16.x86_64.rpm 2e08c96c8fc4f0e9788c2294421ddfeb kdebase-devel-3.1.3-5.16.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm c31f4d2bbfcf759d4c38bdde06f992eb kdebase-3.1.3-5.16.src.rpm i386: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm e0dc3f58ce67381f194db22a0758de0c kdebase-devel-3.1.3-5.16.i386.rpm ia64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 45df8cf839f43893823ba3b2259f04f2 kdebase-3.1.3-5.16.ia64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 72426436d5549ea4e71b03b1fb88658a kdebase-debuginfo-3.1.3-5.16.ia64.rpm b6796be1d8c516c187435617eb15fcf9 kdebase-devel-3.1.3-5.16.ia64.rpm x86_64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 28d8fc17fcaf1186be090059bd4e4fb2 kdebase-3.1.3-5.16.x86_64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 2cd293e4520537f784793b74d6535a48 kdebase-debuginfo-3.1.3-5.16.x86_64.rpm 2e08c96c8fc4f0e9788c2294421ddfeb kdebase-devel-3.1.3-5.16.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/kdebase-3.1.3-5.16.src.rpm c31f4d2bbfcf759d4c38bdde06f992eb kdebase-3.1.3-5.16.src.rpm i386: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm e0dc3f58ce67381f194db22a0758de0c kdebase-devel-3.1.3-5.16.i386.rpm ia64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 45df8cf839f43893823ba3b2259f04f2 kdebase-3.1.3-5.16.ia64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 72426436d5549ea4e71b03b1fb88658a kdebase-debuginfo-3.1.3-5.16.ia64.rpm b6796be1d8c516c187435617eb15fcf9 kdebase-devel-3.1.3-5.16.ia64.rpm x86_64: 2c339d137bff0e3af3e85b09ddfa5a93 kdebase-3.1.3-5.16.i386.rpm 28d8fc17fcaf1186be090059bd4e4fb2 kdebase-3.1.3-5.16.x86_64.rpm 1f54fdec47ba48d7f66b9384b5c326e3 kdebase-debuginfo-3.1.3-5.16.i386.rpm 2cd293e4520537f784793b74d6535a48 kdebase-debuginfo-3.1.3-5.16.x86_64.rpm 2e08c96c8fc4f0e9788c2294421ddfeb kdebase-devel-3.1.3-5.16.x86_64.rpm Red Hat Enterprise Linux AS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm b7a15015df6976ff841b4efa7293996f kdebase-3.3.1-5.19.rhel4.src.rpm i386: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm adab781645d9c252da6829348bd16577 kdebase-devel-3.3.1-5.19.rhel4.i386.rpm ia64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm c9f1cf487949778e60c69a454ed74f62 kdebase-3.3.1-5.19.rhel4.ia64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 8b9b3d16dcd62b998d764eb04a687e44 kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm a44829cb24621cae44d196c41ccbf074 kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm ppc: 481161e9f95e8c9a055f79d9344a0be0 kdebase-3.3.1-5.19.rhel4.ppc.rpm 2b26bb89a9e84a9854501e75378c191b kdebase-3.3.1-5.19.rhel4.ppc64.rpm 28f9481e73c07cdf9dd9ce6d3537ca55 kdebase-debuginfo-3.3.1-5.19.rhel4.ppc.rpm 007963a9914f9c28f7555158fe3f3250 kdebase-debuginfo-3.3.1-5.19.rhel4.ppc64.rpm 753708f22dec8cf9f6590f63e1ced265 kdebase-devel-3.3.1-5.19.rhel4.ppc.rpm s390: e79de4fb8e6e42723a71db2f923e23dd kdebase-3.3.1-5.19.rhel4.s390.rpm 7599418ac4dd1e915380ff8a07dbee67 kdebase-debuginfo-3.3.1-5.19.rhel4.s390.rpm 25193b259ae6c673fa266fe5cba8fcec kdebase-devel-3.3.1-5.19.rhel4.s390.rpm s390x: e79de4fb8e6e42723a71db2f923e23dd kdebase-3.3.1-5.19.rhel4.s390.rpm 51a4573a667b536d1f441f2dd2a0aa04 kdebase-3.3.1-5.19.rhel4.s390x.rpm 7599418ac4dd1e915380ff8a07dbee67 kdebase-debuginfo-3.3.1-5.19.rhel4.s390.rpm f1b8e9bb263554609f8d75d98bc3c79d kdebase-debuginfo-3.3.1-5.19.rhel4.s390x.rpm 4e28d436117f75c86490d3b6bfe1d420 kdebase-devel-3.3.1-5.19.rhel4.s390x.rpm x86_64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm e391179c0b95aa0ddeeb54a2ad86e531 kdebase-3.3.1-5.19.rhel4.x86_64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 571737e00689175ffcca46922ba7c8ee kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm 65d2e53134702886ab9839ef6bbb59cc kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: SRPMS: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm b7a15015df6976ff841b4efa7293996f kdebase-3.3.1-5.19.rhel4.src.rpm i386: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm adab781645d9c252da6829348bd16577 kdebase-devel-3.3.1-5.19.rhel4.i386.rpm x86_64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm e391179c0b95aa0ddeeb54a2ad86e531 kdebase-3.3.1-5.19.rhel4.x86_64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 571737e00689175ffcca46922ba7c8ee kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm 65d2e53134702886ab9839ef6bbb59cc kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm Red Hat Enterprise Linux ES version 4: SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm b7a15015df6976ff841b4efa7293996f kdebase-3.3.1-5.19.rhel4.src.rpm i386: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm adab781645d9c252da6829348bd16577 kdebase-devel-3.3.1-5.19.rhel4.i386.rpm ia64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm c9f1cf487949778e60c69a454ed74f62 kdebase-3.3.1-5.19.rhel4.ia64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 8b9b3d16dcd62b998d764eb04a687e44 kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm a44829cb24621cae44d196c41ccbf074 kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm x86_64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm e391179c0b95aa0ddeeb54a2ad86e531 kdebase-3.3.1-5.19.rhel4.x86_64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 571737e00689175ffcca46922ba7c8ee kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm 65d2e53134702886ab9839ef6bbb59cc kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm Red Hat Enterprise Linux WS version 4: SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/kdebase-3.3.1-5.19.rhel4.src.rpm b7a15015df6976ff841b4efa7293996f kdebase-3.3.1-5.19.rhel4.src.rpm i386: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm adab781645d9c252da6829348bd16577 kdebase-devel-3.3.1-5.19.rhel4.i386.rpm ia64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm c9f1cf487949778e60c69a454ed74f62 kdebase-3.3.1-5.19.rhel4.ia64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 8b9b3d16dcd62b998d764eb04a687e44 kdebase-debuginfo-3.3.1-5.19.rhel4.ia64.rpm a44829cb24621cae44d196c41ccbf074 kdebase-devel-3.3.1-5.19.rhel4.ia64.rpm x86_64: 94a27d51e68dea0f24d8b9e09ad34fec kdebase-3.3.1-5.19.rhel4.i386.rpm e391179c0b95aa0ddeeb54a2ad86e531 kdebase-3.3.1-5.19.rhel4.x86_64.rpm 6949f7a92c03b12f8a469debc3281c7e kdebase-debuginfo-3.3.1-5.19.rhel4.i386.rpm 571737e00689175ffcca46922ba7c8ee kdebase-debuginfo-3.3.1-5.19.rhel4.x86_64.rpm 65d2e53134702886ab9839ef6bbb59cc kdebase-devel-3.3.1-5.19.rhel4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm 423a7e7354a7305d3c824be12dd5d884 kdebase-3.5.4-13.6.el5.src.rpm i386: c1832d13f2e648a6a87fcd0dfb2b46bb kdebase-3.5.4-13.6.el5.i386.rpm 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm x86_64: c1832d13f2e648a6a87fcd0dfb2b46bb kdebase-3.5.4-13.6.el5.i386.rpm ebf43d3a87ed21c01d28200427c4e05c kdebase-3.5.4-13.6.el5.x86_64.rpm 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm 115780997a93804a514a5718a14a664c kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm 423a7e7354a7305d3c824be12dd5d884 kdebase-3.5.4-13.6.el5.src.rpm i386: 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm 16ee8912e23c6bef99f3deb5b19e1827 kdebase-devel-3.5.4-13.6.el5.i386.rpm x86_64: 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm 115780997a93804a514a5718a14a664c kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm 16ee8912e23c6bef99f3deb5b19e1827 kdebase-devel-3.5.4-13.6.el5.i386.rpm 4fa7ba4abe5f2a52fbc17bedcecd0b47 kdebase-devel-3.5.4-13.6.el5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/kdebase-3.5.4-13.6.el5.src.rpm 423a7e7354a7305d3c824be12dd5d884 kdebase-3.5.4-13.6.el5.src.rpm i386: c1832d13f2e648a6a87fcd0dfb2b46bb kdebase-3.5.4-13.6.el5.i386.rpm 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm 16ee8912e23c6bef99f3deb5b19e1827 kdebase-devel-3.5.4-13.6.el5.i386.rpm ia64: 69c116568ded83d4589e83e8ec5f8410 kdebase-3.5.4-13.6.el5.ia64.rpm f0afd3c9b187616f006b5c8a621bb203 kdebase-debuginfo-3.5.4-13.6.el5.ia64.rpm 683531a8d637edc330f8df1b9e46a677 kdebase-devel-3.5.4-13.6.el5.ia64.rpm ppc: 8e624ad8eb5d1cb1e415eac1312c3ea3 kdebase-3.5.4-13.6.el5.ppc.rpm 200635b74b5352b5f4ef6020a567d9f2 kdebase-3.5.4-13.6.el5.ppc64.rpm 04510c9073b8b671522802541bd0a658 kdebase-debuginfo-3.5.4-13.6.el5.ppc.rpm 56deee3c0a28f078e063c977a055d50a kdebase-debuginfo-3.5.4-13.6.el5.ppc64.rpm 55268c2c549b4271d8c34c279adea17a kdebase-devel-3.5.4-13.6.el5.ppc.rpm b0e48827d40cd21da0355bb05ded649d kdebase-devel-3.5.4-13.6.el5.ppc64.rpm s390x: dc3a674d66c136d78e6df81bdd3e9f25 kdebase-3.5.4-13.6.el5.s390.rpm 4ac8d7ca86a129905038cf1fbf912eb5 kdebase-3.5.4-13.6.el5.s390x.rpm 1b03f51a38fdaa6e9a85f3d5d5f6bf50 kdebase-debuginfo-3.5.4-13.6.el5.s390.rpm 25b959cff3f4c08d1c94c7f452bf3475 kdebase-debuginfo-3.5.4-13.6.el5.s390x.rpm 567c25cb274e9a69ecf6c8c0ebca0339 kdebase-devel-3.5.4-13.6.el5.s390.rpm f6ac73f9a500dc0103531cf0dc8d7b2c kdebase-devel-3.5.4-13.6.el5.s390x.rpm x86_64: c1832d13f2e648a6a87fcd0dfb2b46bb kdebase-3.5.4-13.6.el5.i386.rpm ebf43d3a87ed21c01d28200427c4e05c kdebase-3.5.4-13.6.el5.x86_64.rpm 45a8ccb10373f690014a8caecd297f42 kdebase-debuginfo-3.5.4-13.6.el5.i386.rpm 115780997a93804a514a5718a14a664c kdebase-debuginfo-3.5.4-13.6.el5.x86_64.rpm 16ee8912e23c6bef99f3deb5b19e1827 kdebase-devel-3.5.4-13.6.el5.i386.rpm 4fa7ba4abe5f2a52fbc17bedcecd0b47 kdebase-devel-3.5.4-13.6.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022 http://www.adobe.com/support/security/advisories/apsa07-03.html http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFGcCssXlSAg2UNWIIRAlxSAJ9YpEoc+TJZyoST/c/X+2QMLJDTsQCgqobu OcGnNTxaxntAg7gSLgFD5NM= =+d5l - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRnCScCh9+71yA2DNAQLx1QP/VXsU9itIQcbp5GTXcm2SJhUUoP1FRU6Q /4t7p0iO1xpeOJ5NSOqRb9afEHKtxpNy20wwTQIp+ApqSxAbV5oNJr78C8geazex 1G3p9YP5VXiGfXcho521mKUUWxHj0/lesLYprf4yYXqAIXfDI7drbL/CqfXRd4tF uqUZJ0I2/C4= =1rAb -----END PGP SIGNATURE-----