Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1213 - Security Advisory
Issued:
2013-09-05
Updated:
2013-09-05

RHSA-2013:1213 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: gdm security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gdm and initscripts packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The GNOME Display Manager (GDM) provides the graphical login screen, shown
shortly after boot up, log out, and when user-switching.

A race condition was found in the way GDM handled the X server sockets
directory located in the system temporary directory. An unprivileged user
could use this flaw to perform a symbolic link attack, giving them write
access to any file, allowing them to escalate their privileges to root.
(CVE-2013-4169)

Note that this erratum includes an updated initscripts package. To fix
CVE-2013-4169, the vulnerable code was removed from GDM and the initscripts
package was modified to create the affected directory safely during the
system boot process. Therefore, this update will appear on all systems,
however systems without GDM installed are not affected by this flaw.

Red Hat would like to thank the researcher with the nickname vladz for
reporting this issue.

All users should upgrade to these updated packages, which correct this
issue. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386

Fixes

  • BZ - 988498 - CVE-2013-4169 gdm: TOCTTOU race condition on /tmp/.X11-unix

CVEs

  • CVE-2013-4169

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
ia64
gdm-2.16.0-59.el5_9.1.ia64.rpm SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
ia64
gdm-2.16.0-59.el5_9.1.ia64.rpm SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
ia64
gdm-2.16.0-59.el5_9.1.ia64.rpm SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux Workstation 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux Desktop 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
s390x
gdm-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 689447856c50b1d78b0da4e1404d30531e87fc46dd97bc4a8b7279290d69c82f
gdm-debuginfo-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 1493d3dfa2094e656c2f345bde2eec9ccb01370b0f2f9901bd6c83d4e4322515
gdm-docs-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 003708842f13fd3437ad76a6acfb66741cfcf7737120e7290b9b0ee94059eb99
initscripts-8.45.42-2.el5_9.1.s390x.rpm SHA-256: 5377ae312640625cc35bc2bda9ae34e06954b2bc9aa327e55bbc4728a2970cf2
initscripts-debuginfo-8.45.42-2.el5_9.1.s390x.rpm SHA-256: 476520fb55400893b277f7182cae3b13b48be501a1229783017fe6d9587c547e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.9

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
s390x
gdm-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 689447856c50b1d78b0da4e1404d30531e87fc46dd97bc4a8b7279290d69c82f
gdm-debuginfo-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 1493d3dfa2094e656c2f345bde2eec9ccb01370b0f2f9901bd6c83d4e4322515
gdm-docs-2.16.0-59.el5_9.1.s390x.rpm SHA-256: 003708842f13fd3437ad76a6acfb66741cfcf7737120e7290b9b0ee94059eb99
initscripts-8.45.42-2.el5_9.1.s390x.rpm SHA-256: 5377ae312640625cc35bc2bda9ae34e06954b2bc9aa327e55bbc4728a2970cf2
initscripts-debuginfo-8.45.42-2.el5_9.1.s390x.rpm SHA-256: 476520fb55400893b277f7182cae3b13b48be501a1229783017fe6d9587c547e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
ppc
gdm-2.16.0-59.el5_9.1.ppc.rpm SHA-256: 5a38ef8141f6d7d7c957b2e187030423a6b41fef36b44087791396aa8f642b08
gdm-debuginfo-2.16.0-59.el5_9.1.ppc.rpm SHA-256: eda6588b04e4f7bb4792a759307eae11862e3ba31c1d33d1c25a39146406a552
gdm-docs-2.16.0-59.el5_9.1.ppc.rpm SHA-256: e88213a23296ad82bc5647c9a625ed17ca3f57929552d66976b5d8fd23700a1b
initscripts-8.45.42-2.el5_9.1.ppc.rpm SHA-256: d4c7c1c2786f25fce18b062daefc7e52d608f2b5f497620d272b56fbacf0afdd
initscripts-debuginfo-8.45.42-2.el5_9.1.ppc.rpm SHA-256: f43d43fcf939f3ab5c1dbeb402b846b4326c7f92ccb9277deafbebae95fea771

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
ppc
gdm-2.16.0-59.el5_9.1.ppc.rpm SHA-256: 5a38ef8141f6d7d7c957b2e187030423a6b41fef36b44087791396aa8f642b08
gdm-debuginfo-2.16.0-59.el5_9.1.ppc.rpm SHA-256: eda6588b04e4f7bb4792a759307eae11862e3ba31c1d33d1c25a39146406a552
gdm-docs-2.16.0-59.el5_9.1.ppc.rpm SHA-256: e88213a23296ad82bc5647c9a625ed17ca3f57929552d66976b5d8fd23700a1b
initscripts-8.45.42-2.el5_9.1.ppc.rpm SHA-256: d4c7c1c2786f25fce18b062daefc7e52d608f2b5f497620d272b56fbacf0afdd
initscripts-debuginfo-8.45.42-2.el5_9.1.ppc.rpm SHA-256: f43d43fcf939f3ab5c1dbeb402b846b4326c7f92ccb9277deafbebae95fea771

Red Hat Enterprise Linux Server from RHUI 5

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
gdm-2.16.0-59.el5_9.1.src.rpm SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
x86_64
gdm-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
i386
gdm-2.16.0-59.el5_9.1.i386.rpm SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter