If you're using Red Hat or Fedora then you should probably check to ensure that you're not using compromised packages, which might have resulted from illegal access to Red Hat's servers.

You can read about this matter here for Fedora as well as here and here for Red Hat--the latter link provides scripts that you can use to detect packages that might have been tampered with.