USN-933-1: PostgreSQL vulnerability  

Posted by Daniela Mehler

"Ubuntu Security Notice USN-933-1 April 28, 2010
postgresql-8.1, postgresql-8.3, postgresql-8.4 vulnerability
CVE-2010-0442
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
postgresql-8.1 8.1.20-0ubuntu0.6.06.1

Ubuntu 8.04 LTS:
postgresql-8.3 8.3.10-0ubuntu8.04.1

Ubuntu 9.04:
postgresql-8.3 8.3.10-0ubuntu9.04.1

Ubuntu 9.10:
postgresql-8.4 8.4.3-0ubuntu9.10.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that PostgreSQL did not properly sanitize its input when
using substring() with a SELECT statement. A remote authenticated attacker
could exploit this to cause a denial of service via application crash.


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1.diff.gz
Size/MD5: 33787 98a0e6c5015c99a9428aabaa9e51ff0e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1.dsc
Size/MD5: 1135 7dfd50b87affea366e80f4e687dd6137
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20.orig.tar.gz
Size/MD5: 11542102 94a97733e140584fff301c32026b4880

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-doc-8.1_8.1.20-0ubuntu0.6.06.1_all.deb
Size/MD5: 1531996 ed77c5f42ffd39a29da63e07ec37eb52

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 192384 0e6e0bd55513a0034999748c9ff398e1
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 384734 a9421ff302752196afb4c740ea19c355
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 213212 7c5b43941f22ee36b5d1cdbeaaf59eaf
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 214224 acaf824ff818d9f7c60d09d6b53e1516
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 362908 279cd1da17ce62b7328524b4934447e3
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 305814 71ce97fced4ebe529b58c820a4ba7573
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 4356058 8d68d5454980ff4a622f25bb9d152cc4
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 1481292 3cd11f14b8edcd349f67dbf70bbac2b2
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 655498 691a856787a05ae2101ac720200031c8
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 209280 d56d4352a57c7146d9403fe5766ea62e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 203206 e8ef9a2c398d3956ace2e5e593c0f9ca
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 203500 77722ed653892d71fa9ceecc9a0e3dd5
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.20-0ubuntu0.6.06.1_amd64.deb
Size/MD5: 638894 6840f57e310843aae43a850d1218b53c

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 191382 57a44201b880520443f146d4256f0bc1
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 375164 d80d23f7dc1191c4685f7aa1266670d3
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 210952 ef933871f7e46f200332f9119e004907
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 212400 18c3aae156bd5cfe384d2a647f1745f8
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 351374 23012ef0502e88b8a7ac54d3821bc712
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 298672 7507613246bd0320516fb98a637d7840
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 4157076 450ab358c298afd970173a7c6fd9e066
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 1407178 8c61ca6f1bbc05e0a8a33150cb7b9a1a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 609454 9080f03b2c8c7f158ba8a8db2de8ef97
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 207402 cf2200179409e0ad138a033d036f495c
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 200500 57b15d28840a11fa2b1e68d647410b09
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 202088 e4a02136614af148c2054524b649b1f5
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.20-0ubuntu0.6.06.1_i386.deb
Size/MD5: 638908 28074434b830203bcb5d97a9913843be

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 193082 ca798a0c8ddbd47bd5ec9b9098330b34
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 380768 282d9ab377efbf4fb182fbc5932e1faf
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 214024 05530ee276754d00a8feac3f87103d81
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 216540 49a624c762dcbf4b738f0fef9d0a09e4
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 357494 14bd8124b4fc696cf08e6d2351f901ea
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 302300 310aa37c602f276c7f7a2467d89c333a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 4658218 871761e2d5dc66934ce693211aa73d8a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 1480386 ce451fce53339bfd925993d02d80bb1a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 671432 f4a69bf1cd583cc8c2b4442ab567bb7d
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 209096 426391c0c8c21f2654ad5bf4bd745e1e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 203224 cb8b5de643199330ee2ed430dbaffbca
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 204282 177b4c0cf2b1fe9d2e3354123885a878
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.20-0ubuntu0.6.06.1_powerpc.deb
Size/MD5: 638930 a9a1c2d11bb67b9a747a69de486df1fb

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-compat2_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 191100 51331da22bab1ac780519f50278a4327
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg-dev_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 372418 a3a72725d08b77c53f0d077a0e0a52f2
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libecpg5_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 211474 89a8e1c909d840567e830d9b568a1b3e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpgtypes2_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 211916 6047c025a1aaf6c1982c433863ce36c8
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq-dev_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 353584 1d1ca02f319e0247c127ec7150a1c762
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/libpq4_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 298878 06f65db0d620c869a25dd9a986375e91
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 4530672 aa4b05bee7787891194f0c32dc21c332
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-client-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 1436438 55a92e68159dc8ee36e36164dea788a8
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-contrib-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 629550 256e5e919bb0be9f6b08c2106a9260fd
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plperl-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 207640 7b54c929ef39d31f01b96c31c594187b
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-plpython-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 201592 268349b33e676ac78447591387242fc2
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-pltcl-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 202434 b72f8d6fff0ee114044669da2f926528
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.1/postgresql-server-dev-8.1_8.1.20-0ubuntu0.6.06.1_sparc.deb
Size/MD5: 638918 2a04b910a6ffaf3816611ed112a28698

Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1.diff.gz
Size/MD5: 68817 fd9dde9afb7f1416961f4793b6f8da54
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1.dsc
Size/MD5: 1311 578cc1af160a036a73809644cabfa4ba
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10.orig.tar.gz
Size/MD5: 13870846 6c528104faf2808dcbdbd4a644920fe1

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client_8.3.10-0ubuntu8.04.1_all.deb
Size/MD5: 253624 01fb1e202f7484527a36a252f43c7ff9
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib_8.3.10-0ubuntu8.04.1_all.deb
Size/MD5: 253512 bdb5da8d4d35c081398a706d4e59825e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-doc-8.3_8.3.10-0ubuntu8.04.1_all.deb
Size/MD5: 2171682 9805fa58cc2c0800ac30ae4412960f9e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-doc_8.3.10-0ubuntu8.04.1_all.deb
Size/MD5: 3438 a2a91cd882e980c910dd82280c7cd3e1
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql_8.3.10-0ubuntu8.04.1_all.deb
Size/MD5: 253636 afb5d6ec2f3ba2e9614866051909cf81

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 11608 e5d4131272836b697feb14b12d755a55
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 222760 9a895d270dcf1221616dc121aad86576
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 32494 cddf085eecd1b77ce26a26324f49d5a7
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 283446 df3459e080e85fda8947020933367b28
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 190292 7296a750e892ca42258de25c7c3e5caa
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 319288 7fd2050ac0d94006a18416aa2a85baf7
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 3750716 0ec76f766c09a683a860b0459c625aee
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 734220 1995327179e771bff73e4a661496a33a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 366528 b4330f978a3c73436a8b536b97f674cd
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 283830 11ffebc020e9fca0ea6ac8003eb2ae23
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 275804 ae679917772408d50a3af9ed80e30fe2
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 273326 99cbdcbbeecc8360ec6e69cc1f58e6fd
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu8.04.1_amd64.deb
Size/MD5: 821706 5ad845c2239b4bb2bc0ee5e7edfbc78f

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 10608 cf1cbc42218fa0c4a2156d36eec87407
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 214202 8819b2771f76e35f24c065b983aa36d7
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 31504 85ea5a903ad9071eb670496f963a7b63
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 282318 751ddd028ad9831ea906cdd4106c66c0
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 175280 97cadbb7b0628bf15e39bc51e520a0f4
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 314322 02d4a79f8944bc6d4ab5c0a664f254ff
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 3624530 b8092b979867a186bd8ceb83ad579659
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 703414 552a2bd9b823593cea788510ea6fbba8
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 331022 785c0d2853bf511989f24272725da0f5
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 281120 9f475b3926a142dedf135584de58e851
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 272448 b6a53af7734ef3f8e2764d5f54692e8c
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 271856 b5f7321c0f344536231b4e1446488dde
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu8.04.1_i386.deb
Size/MD5: 825808 f2c65f9dd75503423ac0e57f170f53b1

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 10464 815f3fd99aefeb1776d593d4c8321fc9
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 212736 2c719a9bf5374a1fc4125db299465d61
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 30922 a8c0fad70717fca7daf8bff10eb6619f
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 282572 459a646d0e395516dd5d2436613c5aae
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 179822 b028016c77de9168388e44746ea48b58
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 314050 2380dabd5fa176ead8c9faabec170a23
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 3604804 992dbd8f1f8b469d78e4b1b5a3881c84
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 700364 b9f9bc0b21acce627fbe3597f33cc6d1
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 328904 4044bdf779e9e9150280a56ea6ad1307
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 282102 88097410b2152121ac65d1210f2832f5
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 273184 aa1928d6ffb23dd5ded3784458261d35
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 272290 9f4df2931621884acc3b4b2a95b76a2e
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu8.04.1_lpia.deb
Size/MD5: 819538 5c1147f8ba098e7eed44c16b315489d3

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 11262 31f048050ffa712a5164bcb696b49a97
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 217832 973e4d9911c6f6e17c75fcac26636257
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 34076 2c663137ee64bfe061294d6d48a3ae0e
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 286114 a019047174e446f21eb71b5736ceea66
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 190136 b28d3cc18c43b33ae43cc8c4e6f1f5f6
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 318964 a17b07a99be8611117fed21b29cefdff
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 4101056 37b31f30753694d7ff6cc9ac6cae2a30
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 766782 ed2ccf202d019063359ca9419ca7e276
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 416212 df9c2afdb372f6b3a902dec558f4dc63
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 285466 9e2ab2622b099a082205a7a53be74090
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 277436 7d62895995d2d5cc8959180d5ae92dd9
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 275556 6ac53f2a32c78c48d2cb6248922fb669
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu8.04.1_powerpc.deb
Size/MD5: 822356 c1f7eab5c305d3a01154e7075d4da03b

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 9846 f48d0cfce0269335940b33c5620891a0
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 203982 5fd5ef0419bf9c4f019515c411b273f9
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 29680 60852fa732514aac24941391e447fd55
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 279942 7c124f98da2269c0aa6263faf3b17ee6
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 178870 eb851f24f86021ee08648da986af75bb
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 310896 04de3bd170e5b6ce865957c9b1e589fe
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 3858494 aba91cb3d80f17f01304254f68a2c3a1
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 703280 b5432b02297319450beaa1cd14850fa5
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 327006 07c2eeb114c277e2f8f33866391aaf95
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 280398 b6febbcfd145e94939207d1d8f497a65
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 272646 94d4f5960bf058cd8def096080c45a57
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 271730 d7ffc3e5745cf3c9de11b80e1513e0e9
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu8.04.1_sparc.deb
Size/MD5: 820670 4053194366eb88d707d5471bd7eb4864

Updated packages for Ubuntu 9.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1.diff.gz
Size/MD5: 68607 8a83a19afbd33c4c8c622d46f6ef7085
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1.dsc
Size/MD5: 1768 7454f28deecedf089c24276ff513348d
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10.orig.tar.gz
Size/MD5: 13870846 6c528104faf2808dcbdbd4a644920fe1

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client_8.3.10-0ubuntu9.04.1_all.deb
Size/MD5: 256060 310835c4cb05993124708c609ca4c164
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib_8.3.10-0ubuntu9.04.1_all.deb
Size/MD5: 255958 253323d9d42606f0876ed9a7c9514e7d
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-doc-8.3_8.3.10-0ubuntu9.04.1_all.deb
Size/MD5: 2006060 a38fc2c106ed7146362066bb186944b5
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-doc_8.3.10-0ubuntu9.04.1_all.deb
Size/MD5: 3440 b4858810d330ea09d9a99df20b44247d
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql_8.3.10-0ubuntu9.04.1_all.deb
Size/MD5: 256086 65dda2ba8d93d051b8db67c16b136af8

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 11578 1dd794603bdcb0801e6512ae428bef21
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 226458 a658108cfd1f68de3cf781bcbe38d95e
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 32866 9221345312b2b9e5fcda5046a9389f81
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 286402 0af0a09d99d6b1bf9549ec8561f1f0f1
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 192520 145c79df8ac095c57cb93bb561c6d7ea
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 322548 8671bb5499d2a2a575c5b3bf1e5facec
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 3820998 f7700576d709a1c3762d611efc45faac
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 767586 a8457d7d6e3ad523c96e0b8f44b7a6cf
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 374070 3d2f9f24e38d252f9e36919144b847be
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 828406 1b6db50e5a028d03384d393cb434884c
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 284266 ecd0c7928ad0fa0d77bcff3f96a498cf
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 278126 fb1278d692586414e6a28856033d0f6d
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu9.04.1_amd64.deb
Size/MD5: 275596 ba11a2c9166022a336bf322209e1b422

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 10724 8fa4e64e7d7aa7134280146faea92891
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 216432 0096709b89147b1fa129fa8f0fa5425d
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 32150 baf46b37b7fa60c92d25f6f353cfb05f
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 285592 0e47ce13bb06dd4a15541ebc8cad5e4b
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 184578 cb310595b49ff5e4ff6e3ac6d0976db9
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 318474 c9f998a243661b2269de636db18b989b
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 3671210 448d0696b7213a3113d87fb538cbeb85
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 726642 4b947e3374f76dfc241bd595a8036523
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 336458 fe09f014e424566020d218e2fe6b2108
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 823734 541adcc0811ffbe816450bef53e8706e
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 282508 184fdedec8a9079d8791c99a1da57b5a
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 275762 25b63d6e4dbf26285b553f94754c71bf
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu9.04.1_i386.deb
Size/MD5: 274740 28c34fe6c17aa15c84b33d2b0dbc07ef

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 10444 e383c792a0bdda954ac171d1ebb4ffe2
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 216532 54d914725627859cd7782f4f4d325d5d
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 31336 9e69fabd640f1c0e004f21909cabcc91
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 285186 de83430d183d224548e586d56d8a9237
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 181346 0d4e0754c415c6c6ac47798cd6e0aa3e
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 317330 845bfbe00ea3c1423d3cacd1a33c935c
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 3648368 3179102a942db8a573fc2ccae1b8869e
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 721070 cfa43e0b75f8cc7a6acfd14e58ddb0ae
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 332618 3650296848da548a68e4944ecf5aec14
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 823154 913110f42a611256f5c5fca66f177d37
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 282862 716e5b5d4cf3135790738b21ebb670b7
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 275726 7a9771c36fc58685b0304cf34d0562ba
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu9.04.1_lpia.deb
Size/MD5: 274596 4f50101ca9fb4680f2c34592d3bcb3fa

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 11274 1356b6366818e8fe84242dc9aa98c130
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 224208 e87ce7daaab56e94c49ebf3850e12f4d
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 33962 e0865911976df1b5a9c8a0b7289ee960
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 288684 43c84cafeba70cad5c13e6c3c4ef7e92
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 190954 f967a0a699d9c9f6992932e84f758e89
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 321066 db66a32149b5fa56818448be148fc5cd
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 4190332 7fa7063655cb5cebbe720100f0acd6ea
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 796774 f02f9cad46075e0273131d19501d12ec
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 424622 bd8c8554a82d93a06d3d603f672a478d
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 830108 f8bfc4fff8079f39bb048c8da183435f
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 285508 ac7ad1b22bcf29145400f09923a672df
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 279566 e7252cb18c79b2bd799044cb259bb1de
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu9.04.1_powerpc.deb
Size/MD5: 277860 02d0e82eac6579dee33c0422dd9d1cbc

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-compat3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 9846 8d2b798892ccc4af3cd286d9c835a925
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg-dev_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 208380 dcfe69212a5de3063cf44cab45c717a4
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libecpg6_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 29478 979f84bac75d9c94151dbd33ee3aa447
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpgtypes3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 282320 e35c11947fe8bab86ce1619698e49852
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq-dev_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 179340 cbe5c1f4c795b1d87e6f0ee9e37244f0
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/libpq5_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 313782 c36c0929c72c4b2de883b9b41d49e83d
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 3915418 6c968efde68204d0f42dbb4d3ef11288
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-client-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 719694 de04c7edac5affd4928c054deb5e6439
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-contrib-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 332542 a7d7b61760e9d616bf0d7d9f6265fad6
http://ports.ubuntu.com/pool/main/p/postgresql-8.3/postgresql-server-dev-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 823936 a80af4fcb8e00de7eeb4c22b35bc10d4
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plperl-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 280564 9b1d54887fd02db7167fdeac02224f14
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-plpython-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 274818 e35e558473fb6de396c80f51f32709a0
http://ports.ubuntu.com/pool/universe/p/postgresql-8.3/postgresql-pltcl-8.3_8.3.10-0ubuntu9.04.1_sparc.deb
Size/MD5: 273808 159bb6a5f86bd62cf0435286ccd1e6dc

Updated packages for Ubuntu 9.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1.diff.gz
Size/MD5: 33017 c870e9cb59035b7102b51658cfee54bf
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1.dsc
Size/MD5: 1808 773c26e03562f3a12ac78f45f498679b
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3.orig.tar.gz
Size/MD5: 16853436 712a5d8f78814d2de2071cf43ed323ac

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-client_8.4.3-0ubuntu9.10.1_all.deb
Size/MD5: 12874 6a8a2236e16b3493cbce4da08865902b
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-contrib_8.4.3-0ubuntu9.10.1_all.deb
Size/MD5: 12776 7d62d22046249544a78b540294131b90
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-doc-8.4_8.4.3-0ubuntu9.10.1_all.deb
Size/MD5: 1878582 df7e3e17c6f53fea08fac0af57770fdc
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-doc_8.4.3-0ubuntu9.10.1_all.deb
Size/MD5: 3424 9c6c6a7f9f54a914be108a383a1623ac
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql_8.4.3-0ubuntu9.10.1_all.deb
Size/MD5: 12906 5754ec8daddc2fdf9b28578d0ec225a7

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg-compat3_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 11524 33eef5e6dc70e5aa01d142ca8a9f5692
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg-dev_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 241366 cd43019f583ed495a36437bc560748e5
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg6_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 33512 4147d2b7fa1dede6fd9bfd1b77822b02
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpgtypes3_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 44636 81b8f990902a7cbcdfd090ea9a7c1d19
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpq-dev_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 203058 383d84804916c5cc86d0ba1702067fda
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpq5_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 83922 4b3e7fe429bbfdb5c9792a57c79199d3
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 4045600 b31fac449556b6f1ccf8154f54e19a9a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-client-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 826214 b76f36fa3daed7ac720d48a77c3197e0
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-contrib-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 414428 43f52c4f8e574067834465d53f8f1a01
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-server-dev-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 626128 1c935e494c446a594477fdb7990d14b8
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-plperl-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 40942 7f80e6d3ad4e3f8a0096cfac3b79851c
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-plpython-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 35168 3749593f3e4b8f7d23a1183790239a5c
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-pltcl-8.4_8.4.3-0ubuntu9.10.1_amd64.deb
Size/MD5: 32332 81c7697ac59126f552bb177ad1432274

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg-compat3_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 10610 2a81806eb278f9d6302f668d55c2e1e4
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg-dev_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 226044 e348540f0ba75a5184a86b37138bcb67
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libecpg6_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 32452 70ed580adea1fc3c20fe09d7f98dd18f
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpgtypes3_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 43454 3dbb7b931d8eaebc437b415450d2217f
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpq-dev_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 194248 b96a0efd604a9338e28cc8b023d635f4
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/libpq5_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 78678 9c262cc93a28fb2c12db83310f994416
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 3894688 64e53c2d2f03eb79e63a6deba6b28dd6
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-client-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 785024 205559ee8c35e47ae4f6a83563927b8a
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-contrib-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 370820 803852f61b5828654e573500b0bd8f95
http://security.ubuntu.com/ubuntu/pool/main/p/postgresql-8.4/postgresql-server-dev-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 621710 4cf76be1c979bd6c06a84f65e03ed544
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-plperl-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 39144 4bea9591a19fd7f5fa213578fd7c7132
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-plpython-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 32742 227726fb8eed7a6ef9370c6324911c53
http://security.ubuntu.com/ubuntu/pool/universe/p/postgresql-8.4/postgresql-pltcl-8.4_8.4.3-0ubuntu9.10.1_i386.deb
Size/MD5: 31376 8ce102aa998cf94e07a86bfc24d80518

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-compat3_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 10408 b537628f367ef444e9f3158a4e874bbe
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-dev_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 224438 124987e8c7f535ad96588e74adfe8a6c
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg6_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 32046 bfc8c259ddc36b56fb32c470e87fe40d
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpgtypes3_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 43700 996b447f71947ab69f45f161ee0e75f9
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq-dev_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 191716 4ab4c132fdcee2e7f827b480465a96e9
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq5_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 78116 daf41c102437d7b4d5a1566bc9009c5c
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 3885600 9286674190cde9af9f04d6d0f919503a
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-client-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 782274 d5cf7d0c94361dd8986ec3d53fd27e4f
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-contrib-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 368924 c0ae24e78e8c73855c0322fd2dd2512f
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-server-dev-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 621232 a748b68cd723545b49943d35f0dc67ee
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plperl-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 39724 3dde63a09aa496c1e0d169980e387ed7
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plpython-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 32932 cd30ec8455754bed516e532964677c58
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-pltcl-8.4_8.4.3-0ubuntu9.10.1_lpia.deb
Size/MD5: 31694 54d4272c08dd6f42adc45837c38ffb42

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-compat3_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 10946 cd3446af7431d545dac6ad6c3bf28712
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-dev_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 241400 e148ab0d13c32b9ee330115a14b84b0e
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg6_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 34450 e9ccdf8dd7cb4b36eca5926af4079826
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpgtypes3_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 47090 449cdfea51f06c7ca9d0e38f56e8c581
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq-dev_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 201002 8a0897bb1e25e9a9a1460c425cfb3e21
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq5_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 81616 b4dd6a80fc019e34b2f87e33c8f13510
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 4360406 2e3180114e56c4fe17dc76a01d8aa5b1
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-client-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 827704 0ad889702efa79c12f49ef7335e11d33
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-contrib-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 398230 6d32474be0973ba77ea8c70bf18949cc
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-server-dev-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 627498 b26cec38b173f61441ba178063294854
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plperl-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 40100 7b6c8a86a53cf52cda062240132f75ee
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plpython-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 34360 922ce458cac5f4d7f3c0f99378d83951
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-pltcl-8.4_8.4.3-0ubuntu9.10.1_powerpc.deb
Size/MD5: 32306 5256a9c8f5ed93a63efb444cb188c2e7

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-compat3_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 9940 6804239ba01f94885856e161f73f9e31
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg-dev_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 228732 dd0bc4bf2eda432bfc6fa18cd860a997
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libecpg6_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 30684 e4e50f8a43f599c339a33f0f8b0eadc1
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpgtypes3_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 41306 051d4df94061d48e427c35fa0c7e6405
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq-dev_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 189634 eb464d22509e48a452b3f1e1ea13dce4
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/libpq5_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 74086 160ff0400cd5daae206b106fdf9741cb
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 4129454 dd68cc74b04568a710254700b3a0d906
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-client-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 779834 19f5f225f4695d3e3f8db0b2f2535810
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-contrib-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 371802 a82f1a7a79888ffea0a02bf83f445346
http://ports.ubuntu.com/pool/main/p/postgresql-8.4/postgresql-server-dev-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 624774 b8c47d36b7b21debf1da0e01033586e6
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plperl-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 37494 c19a72ab71a6bc825db4deacdeeb958e
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-plpython-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 31778 ebe11fd25482a89e4d65aca9528c7214
http://ports.ubuntu.com/pool/universe/p/postgresql-8.4/postgresql-pltcl-8.4_8.4.3-0ubuntu9.10.1_sparc.deb
Size/MD5: 30464 f9dff3eaf884c0352b07ccb301dc3533




--oyUTqETQ0mS9luUI
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkvY50cACgkQW0JvuRdL8BochACfUYxqWxqpvdksCzztKDVL90wz
0VAAoIIUlJw6L2Nbc/4uyclQNuOeaaul
=qyB5
-----END PGP SIGNATURE-----
"

Hawkwind and Hadouken! to play GuilFestUSN-927-1: NSS vulnerability

RHSA-2010:0383-01 Critical: java-1.6.0-ibm security update  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: java-1.6.0-ibm security update
Advisory ID: RHSA-2010:0383-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0383.html
Issue date: 2010-04-29
CVE Names: CVE-2010-0084 CVE-2010-0085 CVE-2010-0087
CVE-2010-0088 CVE-2010-0089 CVE-2010-0090
CVE-2010-0091 CVE-2010-0092 CVE-2010-0094
CVE-2010-0095 CVE-2010-0837 CVE-2010-0838
CVE-2010-0839 CVE-2010-0840 CVE-2010-0841
CVE-2010-0842 CVE-2010-0843 CVE-2010-0844
CVE-2010-0846 CVE-2010-0848 CVE-2010-0849
=====================================================================

1. Summary:

Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, ppc, s390x, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux AS version 4 Extras - i386, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64

3. Description:

The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.

This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. These
vulnerabilities are summarized on the IBM "Security alerts" page listed in
the References section. (CVE-2010-0084, CVE-2010-0085, CVE-2010-0087,
CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092,
CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839,
CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844,
CVE-2010-0846, CVE-2010-0848, CVE-2010-0849)

All users of java-1.6.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.6.0 SR8 Java release. All running instances
of IBM Java must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

575740 - CVE-2010-0084 OpenJDK Policy/PolicyFile leak dynamic ProtectionDomains. (6633872)
575747 - CVE-2010-0085 OpenJDK File TOCTOU deserialization vulnerability (6736390)
575755 - CVE-2010-0088 OpenJDK Inflater/Deflater clone issues (6745393)
575756 - CVE-2010-0091 OpenJDK Unsigned applet can retrieve the dragged information before drop action occurs(6887703)
575760 - CVE-2010-0092 OpenJDK AtomicReferenceArray causes SIGSEGV -> SEGV_MAPERR error (6888149)
575769 - CVE-2010-0094 OpenJDK Deserialization of RMIConnectionImpl objects should enforce stricter checks (6893947)
575772 - CVE-2010-0095 OpenJDK Subclasses of InetAddress may incorrectly interpret network addresses (6893954)
575808 - CVE-2010-0838 OpenJDK CMM readMabCurveData Buffer Overflow Vulnerability (6899653)
575818 - CVE-2010-0837 OpenJDK JAR "unpack200" must verify input parameters (6902299)
575846 - CVE-2010-0840 OpenJDK Applet Trusted Methods Chaining Privilege Escalation Vulnerability (6904691)
575854 - CVE-2010-0841 OpenJDK JPEGImageReader stepX Integer Overflow Vulnerability (6909597)
575865 - CVE-2010-0848 OpenJDK AWT Library Invalid Index Vulnerability (6914823)
578430 - CVE-2010-0846 JDK unspecified vulnerability in ImageIO component
578432 - CVE-2010-0849 JDK unspecified vulnerability in Java2D component
578433 - CVE-2010-0087 JDK unspecified vulnerability in JWS/Plugin component
578436 - CVE-2010-0839 CVE-2010-0842 CVE-2010-0843 CVE-2010-0844 JDK multiple unspecified vulnerabilities
578437 - CVE-2010-0090 JDK unspecified vulnerability in JavaWS/Plugin component
578440 - CVE-2010-0089 JDK unspecified vulnerability in JavaWS/Plugin component

6. Package List:

Red Hat Enterprise Linux AS version 4 Extras:

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.i386.rpm

ppc:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.ppc64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.ppc64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.ppc64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.ppc64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.ppc64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.ppc.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.ppc64.rpm

s390:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.s390.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.s390.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.s390.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.s390.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.s390.rpm

s390x:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.s390x.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.s390x.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.s390x.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.s390x.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.s390x.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.x86_64.rpm

Red Hat Desktop version 4 Extras:

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.i386.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.i386.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.i386.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el4.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el4.x86_64.rpm

RHEL Desktop Supplementary (v. 5 client):

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.i386.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.x86_64.rpm

RHEL Supplementary (v. 5 server):

i386:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.i386.rpm

ppc:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.ppc64.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.ppc64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.ppc64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.ppc64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.ppc64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.ppc.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.ppc64.rpm

s390x:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.s390.rpm
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.s390x.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.s390x.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.s390.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.s390x.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.s390.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.s390x.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.s390.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.s390x.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.s390.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.s390x.rpm

x86_64:
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-accessibility-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-demo-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-devel-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-javacomm-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-jdbc-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-plugin-1.6.0.8-1jpp.1.el5.x86_64.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.i386.rpm
java-1.6.0-ibm-src-1.6.0.8-1jpp.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-0084.html
https://www.redhat.com/security/data/cve/CVE-2010-0085.html
https://www.redhat.com/security/data/cve/CVE-2010-0087.html
https://www.redhat.com/security/data/cve/CVE-2010-0088.html
https://www.redhat.com/security/data/cve/CVE-2010-0089.html
https://www.redhat.com/security/data/cve/CVE-2010-0090.html
https://www.redhat.com/security/data/cve/CVE-2010-0091.html
https://www.redhat.com/security/data/cve/CVE-2010-0092.html
https://www.redhat.com/security/data/cve/CVE-2010-0094.html
https://www.redhat.com/security/data/cve/CVE-2010-0095.html
https://www.redhat.com/security/data/cve/CVE-2010-0837.html
https://www.redhat.com/security/data/cve/CVE-2010-0838.html
https://www.redhat.com/security/data/cve/CVE-2010-0839.html
https://www.redhat.com/security/data/cve/CVE-2010-0840.html
https://www.redhat.com/security/data/cve/CVE-2010-0841.html
https://www.redhat.com/security/data/cve/CVE-2010-0842.html
https://www.redhat.com/security/data/cve/CVE-2010-0843.html
https://www.redhat.com/security/data/cve/CVE-2010-0844.html
https://www.redhat.com/security/data/cve/CVE-2010-0846.html
https://www.redhat.com/security/data/cve/CVE-2010-0848.html
https://www.redhat.com/security/data/cve/CVE-2010-0849.html
http://www.redhat.com/security/updates/classification/#critical
http://www.ibm.com/developerworks/java/jdk/alerts/

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFL2ceIXlSAg2UNWIIRAqT7AJ4r+sds+h9kyWMXt5265WdK9JYWTACghJ9Y
spwKgxyjw+2K8r5tDEcQ6Gw=
=Zops
-----END PGP SIGNATURE-----
"

Susan Boyle in a panic after intruder incidentRHSA-2010:0356-02 Critical: java-1.6.0-sun security update

RHSA-2010:0380-01 Important: kernel security and bug fix update  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update
Advisory ID: RHSA-2010:0380-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0380.html
Issue date: 2010-04-27
CVE Names: CVE-2009-4027 CVE-2009-4307 CVE-2010-0727
CVE-2010-1188
=====================================================================

1. Summary:

Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 5.4 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux (v. 5.4.z server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* a race condition was found in the mac80211 implementation, a framework
used for writing drivers for wireless devices. An attacker could trigger
this flaw by sending a Delete Block ACK (DELBA) packet to a target system,
resulting in a remote denial of service. Note: This issue only affected
users on 802.11n networks, and that also use the iwlagn driver with Intel
wireless hardware. (CVE-2009-4027, Important)

* a use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)

* a flaw was found in the gfs2_lock() implementation. The GFS2 locking code
could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged user
on a system that has a GFS2 file system mounted could use this flaw to
cause a kernel panic (denial of service). (CVE-2010-0727, Moderate)

* a divide-by-zero flaw was found in the ext4 file system code. A local
attacker could use this flaw to cause a denial of service by mounting a
specially-crafted ext4 file system. (CVE-2009-4307, Low)

Bug fixes:

* if a program that calls posix_fadvise() were compiled on x86, and then
run on a 64-bit system, that program could experience various problems,
including performance issues and the call to posix_fadvise() failing,
causing the program to not run as expected or even abort. With this update,
when such programs attempt to call posix_fadvise() on 64-bit systems,
sys32_fadvise64() is called instead, which resolves this issue. This update
also fixes other 32-bit system calls that were mistakenly called on 64-bit
systems (including systems running the kernel-xen kernel). (BZ#569597)

* on some systems able to set a P-State limit via the BIOS, it was not
possible to set the limit to a higher frequency if the system was rebooted
while a low limit was set:
"/sys/devices/system/cpu/cpu[x]/cpufreq/scaling_max_freq" would retain the
low limit in these situations. With this update, limits are correctly set,
even after being changed after a system reboot. (BZ#569727)

* certain Intel ICH hardware (using the e1000e driver) has an NFS filtering
capability that did not work as expected, causing memory corruption, which
could lead to kernel panics, or other unexpected behavior. In a reported
case, a panic occurred when running NFS connection tests. This update
resolves this issue by disabling the filtering capability. (BZ#569797)

* if "open(/proc/[PID]/[xxxx])" was called at the same time the process was
exiting, the call would fail with an EINVAL error (an incorrect error for
this situation). With this update, the correct error, ENOENT, is returned
in this situation. (BZ#571362)

* multiqueue is used for transmitting data, but a single queue transmit
ON/OFF scheme was used. This led to a race condition on systems with the
bnx2x driver in situations where one queue became full, but not stopped,
and the other queue enabled transmission. With this update, only a single
queue is used. (BZ#576951)

* the "/proc/sys/vm/mmap_min_addr" tunable helps prevent unprivileged
users from creating new memory mappings below the minimum address. The
sysctl value for mmap_min_addr could be changed by a process or user that
has an effective user ID (euid) of 0, even if the process or user does not
have the CAP_SYS_RAWIO capability. This update adds a capability check for
the CAP_SYS_RAWIO capability before allowing the mmap_min_addr value to be
changed. (BZ#577206)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

5. Bugs fixed (http://bugzilla.redhat.com/):

541149 - CVE-2009-4026 CVE-2009-4027 kernel: mac80211: fix spurious delBA handling
547251 - CVE-2009-4307 kernel: ext4: avoid divide by zero when trying to mount a corrupted file system
569597 - posix_fadvise() handles its arguments incorrectly in 32-bit compat mode. [rhel-5.4.z]
569727 - when booted with P-state limit, limit can never be increased [rhel-5.4.z]
569797 - e1000 & e1000e: Memory corruption/paging error when tx hang occurs [rhel-5.4.z]
570863 - CVE-2010-0727 bug in GFS/GFS2 locking code leads to dos
571362 - [5.4] open(/proc/PID/xxx) fails with EINVAL even though it should be ENOENT. [rhel-5.4.z]
576951 - [Broadcom 5.4.z bug] bnx2x: net device is in XON state while the Tx ring is full [rhel-5.4.z]
577206 - kernel: sysctl: require CAP_SYS_RAWIO to set mmap_min_addr [rhel-5.4.z]
577711 - CVE-2010-1188 kernel: ipv6: skb is unexpectedly freed

6. Package List:

Red Hat Enterprise Linux (v. 5.4.z server):

Source:
kernel-2.6.18-164.17.1.el5.src.rpm

i386:
kernel-2.6.18-164.17.1.el5.i686.rpm
kernel-PAE-2.6.18-164.17.1.el5.i686.rpm
kernel-PAE-debuginfo-2.6.18-164.17.1.el5.i686.rpm
kernel-PAE-devel-2.6.18-164.17.1.el5.i686.rpm
kernel-debug-2.6.18-164.17.1.el5.i686.rpm
kernel-debug-debuginfo-2.6.18-164.17.1.el5.i686.rpm
kernel-debug-devel-2.6.18-164.17.1.el5.i686.rpm
kernel-debuginfo-2.6.18-164.17.1.el5.i686.rpm
kernel-debuginfo-common-2.6.18-164.17.1.el5.i686.rpm
kernel-devel-2.6.18-164.17.1.el5.i686.rpm
kernel-headers-2.6.18-164.17.1.el5.i386.rpm
kernel-xen-2.6.18-164.17.1.el5.i686.rpm
kernel-xen-debuginfo-2.6.18-164.17.1.el5.i686.rpm
kernel-xen-devel-2.6.18-164.17.1.el5.i686.rpm

ia64:
kernel-2.6.18-164.17.1.el5.ia64.rpm
kernel-debug-2.6.18-164.17.1.el5.ia64.rpm
kernel-debug-debuginfo-2.6.18-164.17.1.el5.ia64.rpm
kernel-debug-devel-2.6.18-164.17.1.el5.ia64.rpm
kernel-debuginfo-2.6.18-164.17.1.el5.ia64.rpm
kernel-debuginfo-common-2.6.18-164.17.1.el5.ia64.rpm
kernel-devel-2.6.18-164.17.1.el5.ia64.rpm
kernel-headers-2.6.18-164.17.1.el5.ia64.rpm
kernel-xen-2.6.18-164.17.1.el5.ia64.rpm
kernel-xen-debuginfo-2.6.18-164.17.1.el5.ia64.rpm
kernel-xen-devel-2.6.18-164.17.1.el5.ia64.rpm

noarch:
kernel-doc-2.6.18-164.17.1.el5.noarch.rpm

ppc:
kernel-2.6.18-164.17.1.el5.ppc64.rpm
kernel-debug-2.6.18-164.17.1.el5.ppc64.rpm
kernel-debug-debuginfo-2.6.18-164.17.1.el5.ppc64.rpm
kernel-debug-devel-2.6.18-164.17.1.el5.ppc64.rpm
kernel-debuginfo-2.6.18-164.17.1.el5.ppc64.rpm
kernel-debuginfo-common-2.6.18-164.17.1.el5.ppc64.rpm
kernel-devel-2.6.18-164.17.1.el5.ppc64.rpm
kernel-headers-2.6.18-164.17.1.el5.ppc.rpm
kernel-headers-2.6.18-164.17.1.el5.ppc64.rpm
kernel-kdump-2.6.18-164.17.1.el5.ppc64.rpm
kernel-kdump-debuginfo-2.6.18-164.17.1.el5.ppc64.rpm
kernel-kdump-devel-2.6.18-164.17.1.el5.ppc64.rpm

s390x:
kernel-2.6.18-164.17.1.el5.s390x.rpm
kernel-debug-2.6.18-164.17.1.el5.s390x.rpm
kernel-debug-debuginfo-2.6.18-164.17.1.el5.s390x.rpm
kernel-debug-devel-2.6.18-164.17.1.el5.s390x.rpm
kernel-debuginfo-2.6.18-164.17.1.el5.s390x.rpm
kernel-debuginfo-common-2.6.18-164.17.1.el5.s390x.rpm
kernel-devel-2.6.18-164.17.1.el5.s390x.rpm
kernel-headers-2.6.18-164.17.1.el5.s390x.rpm
kernel-kdump-2.6.18-164.17.1.el5.s390x.rpm
kernel-kdump-debuginfo-2.6.18-164.17.1.el5.s390x.rpm
kernel-kdump-devel-2.6.18-164.17.1.el5.s390x.rpm

x86_64:
kernel-2.6.18-164.17.1.el5.x86_64.rpm
kernel-debug-2.6.18-164.17.1.el5.x86_64.rpm
kernel-debug-debuginfo-2.6.18-164.17.1.el5.x86_64.rpm
kernel-debug-devel-2.6.18-164.17.1.el5.x86_64.rpm
kernel-debuginfo-2.6.18-164.17.1.el5.x86_64.rpm
kernel-debuginfo-common-2.6.18-164.17.1.el5.x86_64.rpm
kernel-devel-2.6.18-164.17.1.el5.x86_64.rpm
kernel-headers-2.6.18-164.17.1.el5.x86_64.rpm
kernel-xen-2.6.18-164.17.1.el5.x86_64.rpm
kernel-xen-debuginfo-2.6.18-164.17.1.el5.x86_64.rpm
kernel-xen-devel-2.6.18-164.17.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-4027.html
https://www.redhat.com/security/data/cve/CVE-2009-4307.html
https://www.redhat.com/security/data/cve/CVE-2010-0727.html
https://www.redhat.com/security/data/cve/CVE-2010-1188.html
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFL1uAbXlSAg2UNWIIRAgxvAJ4nkPn7ld1oKOzVpBVrPQOMLXWQCgCdHj8v
XfJgMvZ4f/Zh1dnAqCB659g=
=8YwC
-----END PGP SIGNATURE-----
"

Susan Boyle in a panic after intruder incidentRHSA-2010:0330-01 Moderate: GFS security and bug fix update

USN-929-2: irssi regression  

Posted by Daniela Mehler

"Ubuntu Security Notice USN-929-2 April 20, 2010
irssi regression
https://launchpad.net/bugs/565182
==========================
==========================
=========

A security issue affects the following Ubuntu releases:

Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04
Ubuntu 9.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.04 LTS:
irssi 0.8.12-3ubuntu3.3

Ubuntu 8.10:
irssi 0.8.12-4ubuntu2.3

Ubuntu 9.04:
irssi 0.8.12-6ubuntu1.3

Ubuntu 9.10:
irssi 0.8.14-1ubuntu1.2

After a standard system upgrade you need to restart irssi to effect the
necessary changes.

Details follow:

USN-929-1 fixed vulnerabilities in irssi. The upstream changes introduced a
regression when using irssi with SSL and an IRC proxy. This update fixes
the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that irssi did not perform certificate host validation
when using SSL connections. An attacker could exploit this to perform a man
in the middle attack to view sensitive information or alter encrypted
communications. (CVE-2010-1155)

Aurelien Delaitre discovered that irssi could be made to dereference a NULL
pointer when a user left the channel. A remote attacker could cause a
denial of service via application crash. (CVE-2010-1156)

This update also adds SSLv3 and TLSv1 support, while disabling the old,
insecure SSLv2 protocol.


Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubunt=
u3.3.diff.gz
Size/MD5: 28579 0aae65e919d93a4afdaf6e3ef2f25811
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubunt=
u3.3.dsc
Size/MD5: 997 41e4f8fbd1ea2b5ac46b772a2d870791
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.t=
ar.gz
Size/MD5: 1335967 ddf717a430e1c13a272f528c4f529430

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-3u=
buntu3.3_amd64.deb
Size/MD5: 271514 2f39315d67cfaadb370f7247a7423462
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubunt=
u3.3_amd64.deb
Size/MD5: 1162050 82bbd9e8dda20ae6a206a1fd5e9d58e5

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-3u=
buntu3.3_i386.deb
Size/MD5: 271508 c5d4e95bbfbccb307bad2e276e71346d
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-3ubunt=
u3.3_i386.deb
Size/MD5: 1078826 16960c92a1a4f03b841e672253c6eb66

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.3_l=
pia.deb
Size/MD5: 271514 235171086dc59e7d7d4d7fe80bef59e4
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.3_lpia.=
deb
Size/MD5: 1073104 84c8f6dc52d06120bfc8dbad9048d938

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.3_p=
owerpc.deb
Size/MD5: 271530 c1fde52be473a5a3dd37043c49b46835
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.3_power=
pc.deb
Size/MD5: 1167998 8db4b3fbda07921925c0b1af6b2bbd7b

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-3ubuntu3.3_s=
parc.deb
Size/MD5: 271524 3b9c94ba4051305441aced440c2f414b
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-3ubuntu3.3_sparc=
.deb
Size/MD5: 1103492 b14af4079863e6264dd422e9cfee85b6

Updated packages for Ubuntu 8.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubunt=
u2.3.diff.gz
Size/MD5: 23388 d6438c5ab92e4e5bc906015d7d2df88c
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubunt=
u2.3.dsc
Size/MD5: 1391 61a02c1b1ddcca3136ced650945396a8
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.t=
ar.gz
Size/MD5: 1335967 ddf717a430e1c13a272f528c4f529430

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-4u=
buntu2.3_amd64.deb
Size/MD5: 272502 cb3b40575a281da047225cbc24f5f1d9
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubunt=
u2.3_amd64.deb
Size/MD5: 1167386 1b4d93f3cf0e70284d43ca603c2608ec

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-4u=
buntu2.3_i386.deb
Size/MD5: 272512 be7340e970b815e90a53fc70053eaa7b
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-4ubunt=
u2.3_i386.deb
Size/MD5: 1084856 9be719c2e1970f81e9af98b1caf8e901

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.3_l=
pia.deb
Size/MD5: 272496 c30a61b04cb089d549094b88382ae7e4
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.3_lpia.=
deb
Size/MD5: 1075632 52aa77f32b2fff3fc54cc20c5274ddb3

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.3_p=
owerpc.deb
Size/MD5: 272512 1f27a34b6eb0a4ad0f9a6aa46f3a4913
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.3_power=
pc.deb
Size/MD5: 1165604 d1e7737a6f2082f4816d2de6d7406f53

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-4ubuntu2.3_s=
parc.deb
Size/MD5: 272518 68a4883fd2f754276c3158f35aed2e6a
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-4ubuntu2.3_sparc=
.deb
Size/MD5: 1098202 89c968768d8cf1edbc6eaa2e5cfb7dbb

Updated packages for Ubuntu 9.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubunt=
u1.3.diff.gz
Size/MD5: 25260 5eae245c14716a4c1c4d1d42867004cd
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubunt=
u1.3.dsc
Size/MD5: 1391 21778ad10c27b938c6ed2cfcfdaf1782
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12.orig.t=
ar.gz
Size/MD5: 1335967 ddf717a430e1c13a272f528c4f529430

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-6u=
buntu1.3_amd64.deb
Size/MD5: 272914 6d22140ce3c39e3e21107a9ff4334710
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubunt=
u1.3_amd64.deb
Size/MD5: 1168344 8e579d8d1c0f50fb0f5d9c0e2d9015b3

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.12-6u=
buntu1.3_i386.deb
Size/MD5: 272914 0775c3b7716c29538b3b8716dd6b1951
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.12-6ubunt=
u1.3_i386.deb
Size/MD5: 1086130 fa7400e267918f3ed556bc34dc54e2a2

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.3_l=
pia.deb
Size/MD5: 272914 4c3a58c936ffc744e5862875fa75e712
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.3_lpia.=
deb
Size/MD5: 1076756 afee6c25ec29b4e6fb14a48318bf74e1

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.3_p=
owerpc.deb
Size/MD5: 272934 d041aec1f43c5d0841f5810723d7df1b
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.3_power=
pc.deb
Size/MD5: 1166646 0018cca0d831d5e69fa41105c896da07

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.12-6ubuntu1.3_s=
parc.deb
Size/MD5: 272928 cbdf2e1f763b916a51cf3091eb6c52cf
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.12-6ubuntu1.3_sparc=
.deb
Size/MD5: 1098676 9bf353740f4ada1bc9dc7e31d5e0216f

Updated packages for Ubuntu 9.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.14-1ubunt=
u1.2.diff.gz
Size/MD5: 21960 d215484620343d46296d54e775fb872a
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.14-1ubunt=
u1.2.dsc
Size/MD5: 1391 e04e39359500551b8d19ceaf121b2a5d
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.14.orig.t=
ar.gz
Size/MD5: 1356130 7d9437f53209a61af4fe4c9c5528ffa7

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.14-1u=
buntu1.2_amd64.deb
Size/MD5: 293044 c8d8bb7d5c66441b84d92ac8aa673b5b
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.14-1ubunt=
u1.2_amd64.deb
Size/MD5: 1171276 96929c614e10c32416e0d3322ec47fab

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi-dev_0.8.14-1u=
buntu1.2_i386.deb
Size/MD5: 293072 1d8be08ceb8b756a31930189542e2e24
http://security.ubuntu.com/ubuntu/pool/main/i/irssi/irssi_0.8.14-1ubunt=
u1.2_i386.deb
Size/MD5: 1090056 9eda24d6a1f788aa2f41ce7add4bd1cd

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.14-1ubuntu1.2_l=
pia.deb
Size/MD5: 293050 025897993b94336263a396b857c51915
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.14-1ubuntu1.2_lpia.=
deb
Size/MD5: 1088018 a14696301cb8323cafbcf780ba1da5be

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.14-1ubuntu1.2_p=
owerpc.deb
Size/MD5: 293080 0e657891095c4c63b86df8aeb2b26dbc
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.14-1ubuntu1.2_power=
pc.deb
Size/MD5: 1154298 6378326ae7174d8a4580d8901261aca1

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/i/irssi/irssi-dev_0.8.14-1ubuntu1.2_s=
parc.deb
Size/MD5: 293080 f615ce757f47adae1d1d2fd02f9c9ffe
http://ports.ubuntu.com/pool/main/i/irssi/irssi_0.8.14-1ubuntu1.2_sparc=
.deb
Size/MD5: 1098308 8f6e2e7c0fd5ec0d5966fbf23d25686e




--ZPt4rx8FFjLCG7dd
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkvN5k0ACgkQW0JvuRdL8BrxTgCbBB/kyq6xZOktNdKykh2xJQYe
gbYAoIYsaWunKJhetHjhGQz/Mfynz5Z6
=wLbJ
-----END PGP SIGNATURE-----
"

USN-929-1: irssi vulnerabilitiesHawkwind and Hadouken! to play GuilFest

RHSA-2010:0356-02 Critical: java-1.6.0-sun security update  

Posted by Daniela Mehler

"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: java-1.6.0-sun security update
Advisory ID: RHSA-2010:0356-02
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://rhn.redhat.com/errata/RHSA-2010-0356.html
Issue date: 2010-04-19
CVE Names: CVE-2010-0886 CVE-2010-0887
=====================================================================

1. Summary:

Updated java-1.6.0-sun packages that fix two security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64

3. Description:

The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and
the Sun Java 6 Software Development Kit.

This update fixes two vulnerabilities in the Sun Java 6 Runtime Environment
and the Sun Java 6 Software Development Kit. Further information about
these flaws can be found on the Oracle Security Alert page listed in the
References section. (CVE-2010-0886, CVE-2010-0887)

Users of java-1.6.0-sun should upgrade to these updated packages, which
correct these issues. All running instances of Sun Java must be restarted
for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

581237 - CVE-2010-0886 CVE-2010-0887 Sun Java: Java Web Start arbitrary command line injection

6. Package List:

Red Hat Enterprise Linux AS version 4 Extras:

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.x86_64.rpm

Red Hat Desktop version 4 Extras:

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el4.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el4.x86_64.rpm

RHEL Desktop Supplementary (v. 5 client):

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el5.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el5.x86_64.rpm

RHEL Supplementary (v. 5 server):

i386:
java-1.6.0-sun-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el5.i586.rpm

x86_64:
java-1.6.0-sun-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-demo-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-devel-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-jdbc-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.i586.rpm
java-1.6.0-sun-plugin-1.6.0.20-1jpp.1.el5.x86_64.rpm
java-1.6.0-sun-src-1.6.0.20-1jpp.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-0886.html
https://www.redhat.com/security/data/cve/CVE-2010-0887.html
http://www.redhat.com/security/updates/classification/#critical
http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0886.html

8. Contact:

The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFLzOBdXlSAg2UNWIIRAgH3AJ9eIAGVDngSiWwXNoE1qa0PzxMIuACgpSny
vrMeBq6hmgHRalCN7XE4fI4=
=Aohb
-----END PGP SIGNATURE-----
"

RHSA-2010:0337-01 Critical: java-1.6.0-sun security updateSusan Boyle in a panic after intruder incident