Red Hat Linux 5.2 (Apollo) General Errata

Note: You do NOT need to apply these patches to your Fermi Linux machine, we have been put them in already, and AutoRPM will install updated packages when we determine that they are necessary. Please read our use of AutoRPM at Fermilab for more information on this service.

The following are known problems with Red Hat Linux 5.2 on multiple platforms. Updates are available via FTP from:


If you have problems downloading fixes from the official site (ftp.redhat.com), please try one of the many Red Hat mirrors.

Please note that newer versions of some of these packages may be available in the same location; any new versions which are made available will fix all of the bugs older versions did, so you can use the latest version with no problems.

We are no longer separating the errata into general and platform-specific errata. If you are unsure whether an errata update is for your system, the following information should help:
Intel and Intel-based platform specific RPMs will have the i386 extension, Sparc RPMs will have the sparc extension, and RPMs for the Alpha systems will have the alpha extension. This extension is before .rpm. For example:
foo.1.2-3.i386.rpm would be for the Intel systems
foo.1.2-3.sparc.rpm would be for Sparc systems
foo.1.2-3.alpha.rpm would be for Alpha systems

If you experience problems downloading the RPMs using Netscape or Internet Explorer, you will need to explicitely download to file versus opening in a window. The problem you are encountering is that both browsers think that .rpm files are text files and thus try to show the contents. In Netscape, you can Shift-Click to correctly download the file.


Overview


Detailed Errata


Package: squid
Red Hat, Inc. Security Advisory
Synopsis: Potential misuse of squid cachemgr.cgi
Advisory ID: RHSA-1999:025-01
Issue date: 1999-07-29
Keywords: squid cachemgr.cgi connect

1. Topic:

cachemgr.cgi, the manager interface to Squid, is installed by default in /home/httpd/cgi-bin. If a web server (such as apache) is running, this can allow remote users to sent connect() requests from the local machine to arbitrary hosts and ports.

2. Bug IDs fixed:

3. Relevant releases/architectures:

Red Hat Linux 5.2, all architectures

4. Obsoleted by:

None

5. Conflicts with:

None

6. RPMs required:

Intel:

ftp://updates.redhat.com/5.2/i386/

squid-2.2.STABLE4-0.5.2.i386.rpm

Alpha:

ftp://updates.redhat.com/5.2/alpha/

squid-2.2.STABLE4-0.5.2.alpha.rpm

SPARC:

ftp://updates.redhat.com/5.2/sparc/

squid-2.2.STABLE4-0.5.2.sparc.rpm

Source:

ftp://updates.redhat.com/5.2/SRPMS

squid-2.2.STABLE4-0.5.2.src.rpm

7. Problem description:

A remote user could enter a hostname/IP address and port number, and the cachemgr CGI would attempt to connect to that host and port, printing the error if it fails.

8. Solution:

For each RPM for your particular architecture, run:

rpm -Uvh filename

where filename is the name of the RPM.

Alternatively, you can simply disable the cachemgr.cgi, by editing your http daemons access control files or deleting/moving the cachemgr.cgi binary.

9. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
175b42cc4b603242fbb95e345c14963c  squid-2.2.STABLE4-0.5.2.i386.rpm
f8dfc1198e32c645ed57769a44f3aa6d  squid-2.2.STABLE4-0.5.2.alpha.rpm
2e11f629d2f15af8442d6b724ea4d020  squid-2.2.STABLE4-0.5.2.sparc.rpm
0ea1522539d2aebf298881571253e13d  squid-2.2.STABLE4-0.5.2.src.rpm


These packages are also PGP signed by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command: rpm --checksig

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nopgp

10. References:


Package: samba
Red Hat, Inc. Security Advisory
Synopsis: New Samba packages for Red Hat Linux 4.2, 5.2, 6.0
Advisory ID: RHSA-1999:022-02
Issue date: 1999-07-22
Updated on: 1999-07-29
Keywords: samba smbd nmbd security

Revision History:
1999-07-23: Fix 'Conflicts with' section about smbmount with 2.0/2.2 kernels.

1999-07-29: Add note about %postun of Red Hat Linux 6.0 samba release.

1. Topic:

Samba 2.0.5a has been released. Among the fixes in this release are several security issues present in previous Samba releases.

2. Bug IDs fixed:

1321 2557 2625 2779 2923 2982 3715

3. Relevant releases/architectures:

Red Hat Linux 5.2, all architectures

4. Obsoleted by:

None

5. Conflicts with:

The smbmount code shipped with Samba 2.0 is only compatible with the Linux 2.2 kernel, so it has not been built for the Red Hat Linux 4.2 and 5.2 releases. If smbmount support for the 2.2 kernel is needed under Red Hat Linux 4.2 or 5.2, the source RPM can be rebuilt with the following command line (RPM version 3.0 is required):

rpm --define "KERN22 yes" --rebuild samba-2.0.5a-.src.rpm

The samba package shipped with Red Hat Linux 6.0 (samba-2.0.3-8) has an erroneous post-uninstall script. If this package is upgraded to the errata release, it could cause /var/log/samba and /var/lock/samba to be missing. It is recommended that users of samba under Red Hat Linux 6.0 uninstall the previous release using 'rpm -e samba' before installing the errata release.

6. RPMs required:

Intel:

ftp://updates.redhat.com/5.2/i386/

samba-2.0.5a-0.5.2.i386.rpm
samba-client-2.0.5a-0.5.2.i386.rpm

Alpha:

ftp://updates.redhat.com/5.2/alpha/

samba-2.0.5a-0.5.2.alpha.rpm
samba-client-2.0.5a-0.5.2.alpha.rpm

SPARC:

ftp://updates.redhat.com/5.2/sparc/

samba-2.0.5a-0.5.2.sparc.rpm
samba-client-2.0.5a-0.5.2.sparc.rpm

Source:

ftp://updates.redhat.com/5.2/SRPMS
samba-2.0.5a-0.5.2.src.rpm

7. Problem description:

Several security issues were present in earlier samba releases. - a denial-of-service attack could be performed against nmbd. - a buffer overflow was present in the message service in smbd (not enabled by default under Red Hat Linux) - a race condition was present in smbmnt that could cause problems if installed setuid root (it is not installed setuid root by default under Red Hat Linux 6.0, and is not present under Red Hat Linux 4.2 or 5.2)

Thanks go to Olaf Kirch ([email protected]) for discovering the security holes, as well as the Samba team.

8. Solution:

Install the updated RPMs, and restart the affected services by running:

/etc/rc.d/init.d/smb restart

For each RPM for your particular architecture, run:

rpm -Uvh filename

where filename is the name of the RPM.

9. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
6ce227464edc1e79cf4433ede6d18c05  samba-2.0.5a-0.5.2.i386.rpm
0f8d4c9606af2fd809c55a6dd3f9beae  samba-client-2.0.5a-0.5.2.i386.rpm
cb51e889747ed1786996323863f64868  samba-2.0.5a-0.5.2.alpha.rpm
f82cfb4807fa9399005a03d6dd65dca5  samba-client-2.0.5a-0.5.2.alpha.rpm
d56551d53be6928556bb58517f265e9f  samba-2.0.5a-0.5.2.sparc.rpm
371f7de9553d9c86c4b62d2a92c84bf0  samba-client-2.0.5a-0.5.2.sparc.rpm
e411e3c19d19ab89d35e834c7d379589  samba-2.0.5a-0.5.2.src.rpm


These packages are also PGP signed by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command: rpm --checksig

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nopgp

10. References:

<[email protected]>


Package: rpm
Red Hat, Inc. Errata Advisory
Synopsis: Rpm 3.0.2 release for all Red Hat platforms
Advisory ID: RHEA-1999:018-01
Issue date: 1999-07-07
Keywords: rpm

1. Topic:

This release of rpm is intended to permit all Red Hat platforms to use the same version of rpm.

2. Bug IDs fixed:

The most significant user-visible bugs fixed in rpm-3.0.2 are
#2727 tetex after upgrade is missing files
#2916 Cannot verify installed package against package.rpm
#3449 Build of a noarch source package dumps core

3. Relevant releases/architectures:

Red Hat Linux 5.x, all architectures

4. Obsoleted by:

None

5. Conflicts with:

Packages that are linked with rpm-2.5.x libraries. This includes rpmfind, rpm2html, gnorpm, and kpackage. You will need to upgrade to a version of these packages that have been linked with rpm-3.0.x libraries.

6. RPMs required:

Intel:

ftp://updates.redhat.com/5.2/i386/

rpm-3.0.2-5.x.i386.rpm
rpm-devel-3.0.2-5.x.i386.rpm

Alpha:

ftp://updates.redhat.com/5.2/alpha/

rpm-3.0.2-5.x.alpha.rpm
rpm-devel-3.0.2-5.x.alpha.rpm

SPARC:

ftp://updates.redhat.com/5.2/sparc/

rpm-3.0.2-5.x.sparc.rpm
rpm-devel-3.0.2-5.x.sparc.rpm

Source:

ftp://updates.redhat.com/5.2/SRPMS/
rpm-3.0.2-5.x.src.rpm
7. Problem description:

This release of rpm is intended to permit all Red Hat platforms to use the same version of rpm.

8. Solution:

Upgrade to the latest errata release of rpm by downloading the correct rpm and rpm-devel packages for your architecture and version of Red Hat Linux.

You should install the packages by typing (assuming Red Hat 6.0/i386)
rpm -U rpm-3.0.2-6.0.i386.rpm rpm-devel-3.0.2-6.0.i386.rpm

If you are upgrading from rpm-2.5.x, you should then type
rpm --rebuilddb
because the database format has changed in rpm-3.0. (Note: if you decide to reinstall rpm-2.5.x, you should also type "rpm --rebuilddb" after reinstalling rpm-2.5.x in order to convert the database format back to the form used by rpm-2.5.x).

If you use rpm to build packages, please note that the method of configuring rpm has changed. The commonest configuration problem encountered by packagers who upgrade is how to set topdir to something other than /usr/src/redhat:

In rpm-2.5.x, you would put the following in ~/.rpmrc topdir: /path/to/your/directory/here

In rpm-3.0.x, you should put the following in ~/.rpmmacros %_topdir /path/to/your/directory/here

9. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
8918ae8ed68a26745b0377c70b35339a  5.2/i386/rpm-3.0.2-5.x.i386.rpm
2e978540f2eb07a3f20131dfae6cd04f  5.2/i386/rpm-devel-3.0.2-5.x.i386.rpm
5af3d4d74fe67fd126c203599595857e  5.2/alpha/rpm-3.0.2-5.x.alpha.rpm
ea70406e65d2d3a14a1177736927eef9  5.2/alpha/rpm-devel-3.0.2-5.x.alpha.rpm
f3a5e6e32cdb401def5115aa866b1248  5.2/sparc/rpm-3.0.2-5.x.sparc.rpm
69931f1feae0b975667c3670c371ac50  5.2/sparc/rpm-devel-3.0.2-5.x.sparc.rpm
34d0fc0512071c6b2b2a97bd0e09a2f7  5.2/SRPMS/rpm-3.0.2-5.x.src.rpm
These packages are also PGP signed by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html

You can verify each package with the following command: rpm --checksig

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nopgp

10. References:


Package: nfs
Red Hat, Inc. Security Advisory
Synopsis: Potential security problem in Red Hat 5.2 nfs-server.
Advisory ID: RHSA-1999:016-01
Issue date: 1999-06-24
Keywords: nfs-server root-squashing security

1. Topic:

A potential security problem has been fixed in the nfs-server package.

2. Bug IDs fixed:

3. Relevant releases/architectures:

Red Hat Linux 5.2, all architectures

4. Obsoleted by:

None

5. Conflicts with:

None

6. RPMs required:

Intel:

ftp://updates.redhat.com/5.2/i386/

nfs-server-2.2beta44-1.i386.rpm
nfs-server-clients2.2beta44-1.i386.rpm

Alpha:

ftp://updates.redhat.com/5.2/alpha/

nfs-server-2.2beta44-1.alpha.rpm
nfs-server-clients-2.2beta44-1.alpha.rpm

SPARC:

ftp://updates.redhat.com/5.2/sparc/

nfs-server-2.2beta44-1.sparc.rpm
nfs-server-clients-2.2beta44-1.sparc.rpm

7. Problem description:

A change to 32 bit uid_t's within glibc 2.0.x has opened a potential hole in root-squashing.

8. Solution:

9. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
98bd10854eb9da9ee48d2217055a6979  SRPMS/nfs-server-2.2beta44-1.src.rpm
28da963f934cd376f8cfd0ce7c56747c  alpha/nfs-server-2.2beta44-1.alpha.rpm
894c145fa449c7444b155304a1c5c29e  alpha/nfs-server-clients-2.2beta44-1.alpha.rpm
0780a208a3053c0e127bfee37eb255e3  i386/nfs-server-2.2beta44-1.i386.rpm
823cae1b9bf28640ff933d1783d581c4  i386/nfs-server-clients-2.2beta44-1.i386.rpm
e2578175851a9c50975d289ae4baebfd  sparc/nfs-server-2.2beta44-1.sparc.rpm
e66a63a62f6988ad6885f7a1acb746a8  sparc/nfs-server-clients-2.2beta44-1.sparc.rp


These packages are also PGP signed by Red Hat Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html

10. References:


  • Package: wu-ftpd

    Updated: 10-Jun-1999

    Problem

    • (10-Jun-1999):Notice
      This is a maintenance release of the wu-ftpd package that corrects problems with file name globbing that were broken in a previous errata. In addition, the packages upgrade to the latest version of wu-ftpd with all known exploits fixed on all current Red Hat releases. A problem with ftpwho not displaying complete information has also been fixed.

      A more complete description of current problems with wu-ftpd may be found at http://developer.redhat.com/bugzilla by querying the wu-ftpd component. Bugs #2798 and #2944 describe the file globbing failure symptoms, #2455 describes the ftpwho symptoms.

      Users of Red Hat Linux should upgrade to a new version of wu-ftpd in order to fix these problems.

    Solution:

    Red Hat 5.x:


  • Package: imap

    Updated: 10-Jun-1999

    Problem:

    • (10-Jun-1999) Security Fix:

      This is a security errata for the imap package that corrects a known ipop2d exploit in Red Hat 4.x and Red Hat 5.x.

      A more complete description of current problems with imap may be found at http://developer.redhat.com/bugzilla by querying the imap component. Bug #3161 is the report of ipop2d exploit.

      Users of Red Hat Linux 4.x and 5.x should upgrade to the new version of imap in order to correct this security problem.

    Solution:


  • Package: timetool

    Updated: 11-Jun-1999

    Problem:

    • (27-May-1999):Notice
      The "timetool" time and date configuration utility shipped with Red Hat Linux 4.2 and 5.2 has been found to represent the year 2000 as a non-leapyear, when in fact February 29, 2000 is a valid date. The timetool shipped with Red Hat Linux 6.0 does not have this issue. Users of Red Hat Linux 4.x and 5.x should upgrade to a fixed version of the timetool, which is available at the following locations:

    Solution:


  • Package: mod_perl

    Updated: 27-May-1999

    Problem:

    • (27-May-1999) Update to the latest

      The mod_perl Apache module shipped with Red Hat Linux 5.2 and Secure Web Server 2.0 does not function properly with the latest errata release of perl available for that platform (perl-5.004m7-1). This is due to dependencies within mod_perl on perl itself. Users which rely on mod_perl functionality are encouraged to upgrade to a fixed version available at the following locations:

    Solution:


  • Package: NFS

    Updated: 16-Apr-1999

    Problem:

    • (16-Apr-1999)Update to the latest

      Due to many reports of security breaches of Red Hat systems from NFS, we have updated the NFS for other versions of RH Linux to the latest. We have done the same for RH 5.2. This version fixes several small Denial of Service problems.

    Solution:


  • Package: rsync

    Updated: 16-Apr-1999

    Problem:

    • (16-Apr-1999):Security Fix

      Potential security problems have been identified in the rsync package shipped with Red Hat Linux 5.2. A user can not exploit this hole deliberately to gain privileges (ie. this is not an "active" security hole) but a system administrator could easily be caught by the bug and inadvertently compromise the security of their system.

      Red Hat would like to thank Andrew Tridgel for providing an update that fixed the problem.

      Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site:

    Solution:


  • Package: procmail

    Updated: 16-Apr-1999

    Problem:

    • (16-Apr-1999):Security Fix

      Potential security problems have been identified in all the procmail packages shipped with Red Hat Linux. Currently Red Hat is not aware of any exploits built on these vulnerabilities.

      Red Hat would like to thank the members of the Bugtraq list for reporting these problems and the authors of procmail for quickly providing an update.

      Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site:

    Solution:


  • Package: lpr

    Updated: 16-Apr-1999

    Problem:

    • (16-Apr-1999):Security Fix
      Security vulnerabilities have been found in the versions of lpr that ship with Red Hat Linux. Thanks go to the Linux Security Audit team for discovering the vulnerability. It is recommended that all users of Red Hat Linux upgrade to the new packages.

    Solution:


  • Package: XFree86

    Updated: 01-Apr-1999

    Problem:

    • (01-Apr-1999) Security Fix:

      Security vulnerabilities have been identified in the XFree86 packages that ship with Red Hat Linux. This security problem can allow local users to get write access to directories that they are otherwise not able to write to.

      Red Hat would like to thank the members of the BUGTRAQ mailing list, the members of the Linux Security Audit team, and others. All users of Red Hat Linux are encouraged to upgrade to the new packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    • (22-Jan-1999)

      New RPMs for XFree86 3.3.3.1 (X11) are available for Red Hat Linux 4.2 and 5.x on all platforms. This new release is primarily a bugfix release. It corrects problems with a few drivers (especially the 3D Labs slowdown problem), fixes Russian KOI8 font support, and fixes the font server xfs, which was inadvertently broken in our release of XFree86 3.3.3. Please see the official release notes at http://www.xfree86.org/#news for further information.

    Solution:

    In some circumstances, you may be required to add --force and/or --nodeps to the rpm command line options to insure a proper upgrade. Add these options if the command line given gives an error.


  • Package: pine

    Updated: 01-Apr-1999

    Problem:

    • (01-Apr-1999):Security Fix

      An problem in the mime handling code could allow a remote user to execute certain commands on a local system.

      Red Hat would like to thank the members of the BUGTRAQ mailing list, the members of the Linux Security Audit team, and others. All users of Red Hat Linux are encouraged to upgrade to the new packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    Solution:

    Further Instructions


  • Package: mutt

    Updated: 01-Apr-1999

    Problem:

    • (01-Apr-1999):Security Fix

      An problem in the mime handling code could allow a remote user to execute certain commands on a local system.

      Red Hat would like to thank the members of the BUGTRAQ mailing list, the members of the Linux Security Audit team, and others. All users of Red Hat Linux are encouraged to upgrade to the new packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    Solution:


  • Package: zgv

    Updated: 01-Apr-1999

    Problem:

    • (01-Apr-1999):Security Fix
      Local users could gain root access.

      Red Hat would like to thank the members of the BUGTRAQ mailing list, the members of the Linux Security Audit team, and others. All users of Red Hat Linux are encouraged to upgrade to the new packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    • (06-Nov-1998) Security Fix:

      Auditors of zgv have found buffer overflows that could be exploited to gain root privileges. Red Hat would like to thank the users of the BUGTRAQ security list for identifying the problem and Kevin Vajk for providing a fix.

    Solution:


  • Package: Sysklogd

    Updated: 01-Apr-1999

    Problem:

    • (01-Apr-1999):Security Fix

      An overflow in the parsing code could lead to crashes of the system logger.

      Red Hat would like to thank the members of the BUGTRAQ mailing list, the members of the Linux Security Audit team, and others. All users of Red Hat Linux are encouraged to upgrade to the new packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    • (17-Nov-1998):Security Fix

      A buffer overflow has been identified in all versions of the sysklogd packages shipped with Red Hat Linux. As the time of this post there are no known exploits for this security vulnerability.

      Red Hat would like to thank Michal Zalewski ([email protected]) and the members of the Bugtraq mailing list for discovering this problem and providing a fix.

      Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site:

    Solution:

    Further Instructions

    Once you have downloaded the sysklogd package for your architecture, you will need to do the following as root:

    
        rpm -Uvh sysklogd*rpm
    
        /etc/rc.d/init.d/syslog restart
    
        

  • Package: lsof

    Updated: 19-Feb-1999

    Problem:

    • (19-Feb-1999):Security Update

      Red Hat Linux 5.2 is shipping with a vulnerable version of lsof. The lsof binary is shipped setgid kmem and by exploiting a buffer overflow a user will be able to get kmem group access. Fortunately the permissions on /dev/kmem on Red Hat Linux will only grant read only access to kmem group members, so this exploit can not be used to get root access.

      There is an exploit floating around the net for this security problem which is based on the fact that some distributions grant both read and write access for the kmem group members to /dev/kmem.

      Red Hat would like to thank HERT - Hacker Emergency Response Team - for bringing this problem to our attention.

      Although this security hole can not be used to get root access on Red Hat Linux, there are privacy concerns that prompt us to release a security update for the lsof package. All users of Red Hat Linux 5.2 are encouraged to upgrade to the new lsof packages immediately. As always, these packages have been signed with the Red Hat PGP key.

    Solution:

    Further Instructions: You may get an error using this version of lsof if you have not upgraded to the 2.0.36-1 or 2.0.36-3 kernel RPMs.


  • Package: minicom

    Updated: 09-Feb-1999

    Problem:

    • (09-Feb-1999) Security Fix:

      Current minicom packages have permissions set to allow all users to access a modem on a system. This update fixes this problem limiting users to those listed in the minicom configuration file.

      New packages are available for the supported versions of Red Hat Linux. All users of Red Hat Linux are encouraged to upgrade to the new minicom releases immediately. As always, these packages have been signed with the Red Hat PGP key.

    Solution:


  • Package: dump

    Updated: 02-Feb-1999

    Problem:

    • (02-Feb-1999):Update
      Dump was not working correctly on the sparc platform. However, to keep the same revision numbers on all platforms, we have released it for all 3 architectures.

    Solution:

    Further Instructions You should be able to upgrade the package using RPM. Example:

    
        rpm -Uvh dump-0.3-17.sparc.rpm
        
        

  • Package: perl

    Updated: 02-Feb-1999

    Problem:

    • (02-Feb-1999):Update
      This is an update for the perl package shipped wity Red Hat 5.2 that addresses some fo the problems reported running majordomo and misc CGI scripts under this version of perl.

    Solution:

    Further Instructions You should be able to upgrade the package using RPM. Example:

    
        rpm -Uvh perl-5.004m7-1.i386.rpm
        
        

  • Package: Xconfigurator

    Updated: 02-Feb-1999

    Problem:

    • (02-Feb-1999):Notice
      An updated version of Xconfigurator has been released to work with XFree86-3.3.3.1. Xconfigurator can be subsituted for XF86Setup in the setup stage of your video card.

    Solution:

    Further Instructions You should be able to upgrade the package using RPM. Example:

    
        rpm -Uvh Xconfigurator-3.89-1.i386.rpm
        
        

  • Package: FVWM2

    Updated: 19-Jan-1999

    Problem:

    • (19-Jan-1999):Notice
      Users who update to the latest XFree86 also need to update to the latest FVWM2 rpms for AnotherLevel (Red Hat default window manager) to work.

    Solution:


  • Package: Kernel

    Updated: 03-Jan-1999

    Problem:

    • (03-Jan-1999):New Drivers

      Red Hat has further patched the standard 2.0.36 kernel with updated drivers for the Adaptec 7xxx cards, NCR scsi, 3com 905B, and some other patches.

    • (08-Dec-1998):Security Fix

      Several security holes were found in the Linux kernel and patched in the 2.0.36 kernel. Users should upgrade to patch these problems. The announcement can be found here.

    Solution:

    Further Instructions For instructions on upgrading users should read the Red Hat kernel upgrade howto. While the howto focuses on intel, there are sub chapters for upgrading alpha and sparc machines.


  • Package: pam

    Updated: 03-Jan-1999

    Problem:

    • (03-Jan-1999)Security Fix:
      1. Risk level: SMALL

        The default configuration as shipped with the supported releases of Red Hat Linux is not vulnerable to this problem.

      2. Description

        A race condition that can be exploited under some particular scenarios has been identified in all versions of the Linux-PAM library shipped with all versions of Red Hat Linux. The vulnerability is exhibited in the pam_unix_passwd.so module included in Red Hat Linux, but *not* used by either of the 4.2 or 5.x releases. Red Hat Linux uses the pam_pwdb.so module for performing PAM authentication.

        You are at risk if you enabled pam_unix_passwd.so and are using it instead of the pam_pwdb.so module. An exploit occurs when an user with a umask setting of 0 is trying to change the login password.

        As of this release there are no known exploits of this security problem.

    Solution:


  • Package: New Boot Images

    Updated: 01-Feb-1999

    Problem:

    • (01-Feb-1999):Update
      Extended instructions for writing to floppy disk.
    • (03-Jan-1999):Notice

      New boot and supplemental floppy images have been uploaded to correct the following problems:

      • French translation
        • Users must boot with "linux supp" and use a supplemental disc to get the second stage installer translated in French)
      • Hard drive installs from fat, vfat, and fat32 filesystems
      • Disk Druid can now recognize Windows 98 extended partitions.
        • Users installing from CD-ROM or NFS must boot with "linux supp" and use a supp disk if they need to modify disks with Windows 98 extended partitions.

      You will need to download these image files to your harddrive since they are the exact size of a formatted floppy disk (and thus will not fit).

      You will then need to use the DOS rawrite.exe command found on the CD-rom, or if you have Linux installed on another machine, can use the dd command to write the image to the floppy using:

      	  insert first floppy
      	    dd if=boot.img of=/dev/fd0 bs=72k
      	  change floppies
      	    dd if=supp.img of=/dev/fd0 bs=72k
      	  

    Solution:

    Further Instructions

    Users experiencing problems with aic7xxx or ncr53c8xx drivers need to go to <ALT-F2> when the mouse configuration screen comes up and type:

    
    	  cp /modules/aic7xxx.o /mnt/lib/modules/2.0.36-0.7/scsi
    
    	  
    or
    
    	  cp /modules/ncr53c8xx.o /mnt/lib/modules/2.0.36-0.7/scsi
    
    	  

    This will put the correct driver in the initrd that gets created before lilo is installed.

    Users will be able to install using 3c905B in 100 Mbps mode. After reboot the card will be using the old driver, therefore it will not be able to enter 100 Mbps mode. Updating to the new kernel rpm will correct this.


  • Package: FTP client

    Updated: 22-Dec-1998

    Problem:

    • (22-Dec-1998):Security

      A security vulnerability has been identified in all versions of the ftp client binary shipped with Red Hat Linux. An exploit for this vulnerability would have to rely on getting the user to connect using passive mode to a server running a ftp daemon under the attacker's control. As of this release time there are no known exploits of this security problem.

      All users of Red Hat Linux are encouraged to upgrade to the new package releases immediately. As always, these packages have been signed with the Red Hat PGP key.

    Solution:

    Further Instructions

    Once you have downloaded the NetKit package for your architecture, you will need to do the following as root:

    
        rpm -Uvh ftp-0.10-4*rpm
    
        

  • Package: Netscape

    Updated: 25-May-1999

    Problem:

    • (25-May-1999) Security Update:

      New netscape packages are available. While these are not specifically security updates, among the changes listed are 'Fixes to improve security'; therefore it is recommended that users update to the new packages.

    Solution:


    Updated: 22-Dec-1998

    Problem:

    • (22-Dec-1998) Security Update:

      Various security vulnerabilities have been found in versions of Netscape Navigator and Communicator as shipped with Red Hat Linux. More information on the security vulnerabilities is available at Netscape

      It is recommended that users of Red Hat Linux upgrade to the new packages available on our FTP site:

    Solution:


  • Package: libc5

    Updated: 13-Nov-1998

    Problem:

    • (13-Nov-1998) Security Fix:

      A buffer overflow has been identified in all versions of the libc 5 packages shipped with Red Hat Linux. The most affected systems are those that are libc 5 based (Red Hat Linux 4.2 and older). Only Intel and Sparc architectures are affected.

      The Red Hat Linux 5.x releases are glibc (libc 6) based, and Red Hat does not ship any binaries linked against libc 5 that might be used for compromising the system's security. However, Red Hat Linux 5.x releases do include for backwards compatibility a package containg a vulnerable library.

      Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site:

                rpm -Uvh libc-5.3.12-28.i386.rpm
                

    Solution:


  • Package: Install (Alpha)

    Updated: 13-Nov-1998

    Problems:

    • (13-Nov-1998)

      A problem has been found with the install when selecting individual packages. To get around this problem, you will need to down load the updated ramdisk from the ftp site. Then rawrite the image to a floppy following the instructions in the manual.

    Solution:


  • Package: svgalib

    Updated: 06-Nov-1998

    Problem:

    • (06-Nov-1998) Security Fix:

      svgalib has been found to leak file descriptors to /dev/mem. Red Hat would like to thank the users of the BUGTRAQ security list for identifying the problem and Kevin Vajk for providing a fix. Users of Red Hat Linux are recommended to upgrade to the new packages available under the updates directory on our ftp site: To upgrade this package use the rpm command: rpm -Uvh svgalib-1.3.0-1

    Solution:



    Support | Product Errata |

    Copyright © 1995-1999 Red Hat Software. Legal notices



    Home  |  Products & Services  |  Store  |  Download  |  Product Support
    Partners & Programs  |  Community Center  |  News & Views  |  Application Marketplace
    Knowledgebase  |  Legal Statement  |  Privacy Statement  |  Y2K Statement  |  Join  |  Feedback

    copyright © 1999 Red Hat, Inc. All rights reserved.

  •