Red Hat Linux 5.0 (Hurricane) General Errata (Updated: 28-Aug-1998 ) [1]mail problems with errata to faq-maintainer See also: * [2]Red Hat Linux/Intel 5.0 Errata * [3]Red Hat Linux/Alpha 5.0 Errata The following are known problems with Red Hat Linux 5.0 on multiple platforms. Updates are available for FTP from: * Intel: [4]ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ * Alpha: [5]ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ Please note that newer versions of some of these packages may be available in the same location; any new versions which are made available will fix all of the bugs older versions did, so you can use the latest version with no problems. _________________________________________________________________ Overview * 28-Aug-1998: [6]nfs * 20-Aug-1998: [7]XFree86 * 11-Aug-1998: [8]apache * 24-Jul-1998: [9]SysVinit * 24-Jul-1998: [10]mutt * 24-Jul-1998: [11]ncurses * 24-Jul-1998: [12]kernel * 24-Jul-1998: [13]imap * 23-Jul-1998: [14]initscripts * 20-Jul-1998: [15]glibc * 14-Jul-1998: [16]samba * 02-Jul-1998: [17]rpm * 02-Jul-1998: [18]libtermcap * 30-Jun-1998: [19]bind * 30-Jun-1998: [20]tin * 30-Jun-1998: [21]slang * 30-Jun-1998: [22]metamail * 30-Jun-1998: [23]mailx * 23-Jun-1998: [24]elm * 10-Jun-1998: [25]findutils * 10-Jun-1998: [26]xscreensaver * 28-May-1998: [27]dhcp * 28-May-1998: [28]minicom * 28-May-1998: [29]dhcpcd * 28-May-1998: [30]bootp * 23-Apr-1998: [31]lpr * 20-Apr-1998: [32]upgrade failure * 18-Apr-1998: [33]ypbind * 17-Apr-1998: [34]procps * 01-Apr-1998: [35]lynx * 25-Mar-1998: [36]kbd * 21-Mar-1998: [37]mh * 20-Mar-1998: [38]ncftp * 10-Mar-1998: [39]perl * 09-Mar-1998: [40]textutils * 08-Feb-1998: [41]pine * 05-Feb-1998: [42]bru * 28-Jan-1998: [43]gzip * 26-Jan-1998: [44]ppp * 26-Jan-1998: [45]tmpwatch * 19-Jan-1998: [46]gated * 13-Jan-1998: [47]quota * 31-Dec-1997: [48]dump * 31-Dec-1997: [49]shadow-utils * 30-Dec-1997: [50]trn * 30-Dec-1997: [51]ircii * 29-Dec-1997: [52]util-linux * 17-Dec-1997: [53]fstool * 12-Dec-1997: [54]wu-ftpd * 12-Dec-1997: [55]vixie-cron * 12-Dec-1997: [56]joe * 10-Dec-1997: [57]mouseconfig * 10-Dec-1997: [58]gtk * 08-Dec-1997: [59]window manager failure * 05-Dec-1997: [60]tcp_wrappers-7.6-2 * 03-Dec-1997: [61]transfig _________________________________________________________________ Detailed Errata _________________________________________________________________ Package: nfs Updated: 28-Aug-1998 Problem: * (28-Aug-1998)Security Fix: Potential security problems have been identified in all versions of nfs-server packages shipped with Red Hat Linux. Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site. Solution: * Intel: Upgrade to: [62]nfs-server-2.2beta29-7.i386.rpm [63]nfs-server-clients-2.2beta29-7.i386.rpm * Alpha: Upgrade to: [64]nfs-server-2.2beta29-7.alpha.rpm [65]nfs-server-clients-2.2beta29-7.alpha.rpm _________________________________________________________________ Package: XFree86 Updated: 20-Aug-1998 Problem: * (20-Aug-1998) Updated RPMS are available adding some new features to existing drivers. * (11-Jun-1998) A build system mistake was made when the previous packages were built and announced. Many server packages were not built, so a rebuild of the XFree tree was done. All packages are now available in the ftp dir. * (05-Jun-1998) Security Fix: Major security holes have been found in the X libraries and xterm, which allow local users access to the root user. All systems which have X-Windows installed should update their systems. Thanks to the XFree86 group for providing the patches. * (04-Feb-1998) Various problems have been found in the X server which makes it a serious threat to system security. All versions of the X server, including MetroX and AcceleratedX, are thought to be affected (only XFree86 and the MIT X reference implementations are known to be, however). This problem affects all Red Hat Linux platforms and versions. Solution: * Intel: Upgrade to: [66]Xconfigurator-3.26.1-1.i386.rpm [67]XFree86-3.3.2.3-18.i386.rpm [68]XFree86-libs-3.3.2.3-18.i386.rpm * Alpha: Upgrade to: [69]Xconfigurator-3.26.1-1.alpha.rpm [70]XFree86-3.3.2.3-18.alpha.rpm [71]XFree86-libs-3.3.2.3-18.alpha.rpm At this point, you can either upgrade the XFree server as well or remove the setuid bit on your current X server. To upgrade your server, simply install the correct server package from the ftp site in the same updates directory where you got the other XFree86 packages. To remove the setuid bit from all X servers installed on your system, issue the following command: chmod u-s /usr/X11R6/bin/X* After these steps have been completed, X should functions as usual. Thanks to everyone on BUGTRAQ who brought these problems to our attention. _________________________________________________________________ Package: apache Updated: 11-Aug-1998 Problem: * (11-Aug-1998)Security Fix: A denial-of-service attack against the Apache web server has been found which lets remote sites disable your web server. This attack does not let remote users gain any sort of access to your computer, nor does it let local users gain any special access. Red Hat recommends upgrading apache on systems which are functioning as Internet servers. rpm -Uvh apache-1.2.6-5*rpm /etc/rc.d/init.d/httpd stop /etc/rc.d/init.d/httpd start * (07-Jan-1998)Security Fix: Some potentially serious security flaws have been found in apache. While there problems do not allow any compromises by remote users, they do allow local users to gain access to the UID which apache is running as. Under all versions of Red Hat Linux, this is the user 'nobody', which greatly minimizes the impact of these problems. * (31-Dec-1997)Security Fix: A denial-of-service attack against apache http servers was recentely discovered. This fixes the problem for 5.0. Solution: * Intel: Upgrade to [72]apache-1.2.6-5.i386.rpm * Alpha: Upgrade to [73]apache-1.2.6-5.alpha.rpm _________________________________________________________________ Package: SysVinit Updated: 30-Jul-1998 Problem: * (30-Jul-1998)Security Fix: Update corrects a root-usable overflow in SysVInit allowed securelevels to be subverted. Solution: * Intel: Upgrade to [74]SysVinit-2.74-4.i386.rpm * Alpha: Upgrade to [75]SysVinit-2.74-4.alpha.rpm _________________________________________________________________ Package: mutt Updated: 30-Jul-1998 Problem: * (30-Jul-1998)Security Fix: Fixes buffer overflow problems found by BugTraq people that can cause mutt to crash and possibly execute intruder's code. Solution: * Intel: Upgrade to [76]mutt-0.91.1-5.i386.rpm * Alpha: Upgrade to [77]mutt-0.91.1-5.alpha.rpm _________________________________________________________________ Package: ncurses Updated: 24-Jul-1998 Problem: * (24-Jul-1998) Security Fix: Potential security problems have been identified in all versions of ncurses packages shipped with Red Hat Linux. Users of Red Hat Linux are recommended to upgrade to the new packages available under updates directory on our ftp site: * (10-Dec-1997) This fixes the screen size problems seen in ncftp (among others). * (31-Dec-1997) Fixes same problem as above, however, now built properly on the alpha as well. Solution: * Intel: Upgrade to [78]ncurses-1.9.9e-9.i386.rpm * Intel: Upgrade to [79]ncurses-devel-1.9.9e-9.i386.rpm * Alpha: Upgrade to [80]ncurses-1.9.9e-9.alpha.rpm * Alpha: Upgrade to [81]ncurses-devel-1.9.9e-9.alpha.rpm }) _________________________________________________________________ Package: kernel Updated: 28-Jul-1998 Problem: * (28-Jul-1998) Security Fix: The 2.0.35 kernel fixes various denial of service attacks. For more information on fixes and enhancements please see the [82]Linux HQ 2.0 kernel patches page. To upgrade a Red Hat 5.0 box to the new kernels, you must also upgrade the modutils and initscripts packages. The kernel-modules package has also been eliminated. The modules are now a part of the base kernel package. Alpha customers will need to download the kernel source and header RPMs and compile a kernel for their individual machines. * (17-Apr-1998) Security Fix: A denial of service attack in the TCP/IP code has been discovered with the current Red Hat kernels on all platforms and versions. Red Hat suggests that all users upgrade their kernel to one that has been patched against this attack. The packages have been signed with the Red Hat PGP key. Thanks to Alan Cox for the fix. Solution: * Intel: Upgrade to [83]kernel-2.0.35-2.i386.rpm [84]kernel-headers-2.0.35-2.i386.rpm [85]kernel-ibcs-2.0.35-2.i386.rpm [86]kernel-pcmcia-cs-2.0.35-2.i386.rpm [87]kernel-source-2.0.35-2.i386.rpm [88]modutils-2.1.85-4.i386.rpm [89]initscripts-3.67-1.i386.rpm * Alpha: Upgrade to [90]kernel-headers-2.0.35-1.alpha.rpm [91]kernel-source-2.0.35-1.alpha.rpm [92]initscripts-3.67-1.alpha.rpm _________________________________________________________________ Package: imap Updated: 24-Jul-1998 Problem: * (24-Jul-1998) Security Fix: This version fixes buffer overflow problems found by the Linux Security Audit group in the imap daemon. * (12-Dec-1997) Some users reported imapd segfaulting on some inboxes. The latest versioni of imap sources fix this problem for the the test cases we have access to. Solution: * Intel: Upgrade to [93]imap-4.1.final-1.i386.rpm * Alpha: Upgrade to [94]imap-4.1.final-1.alpha.rpm _________________________________________________________________ Package: initscripts Updated: 23-Jul-1998 Problem: * (23-Jul-1998) This newer version fixes module issues when booting with loaders other than LILO, i.e. linload, syslinux, grub, chos, and problems with module dependencies. NOTE: This version of initscripts is intended for more recent, 2.0.34 and 2.0.35, kernels. Please see the [95]5.0 Intel errata for the newest kernel. * (10-Mar-1998) Security Fix: The initscripts package has various temporary file creation race conditions. These bugs allow local users to create at least denial of service conditions and may allow local users to gain root access to affected systems. All systems with local users that do not have the root password should have these fixes applied. The fixes are available for Red Hat Linux 5.0. As always, these packages have been signed with the Red Hat PGP key. * (30-Dec-1997) /proc gets mounted properly with this package. The package initscripts-3.25 had a bug that caused problems with some clone network device configurations. This also fixes the extremely slow tar extractions (a specific case of general user and group lookname brokeness) Solution: * Intel: Upgrade to [96]initscripts-3.67-1.i386.rpm * Alpha: Upgrade to [97]initscripts-3.67-1.alpha.rpm _________________________________________________________________ Package: glibc Updated: 23-Jul-1998 Problem: * (23-Jul-1998) Many fixes, including but not limited to: RPC security patches, timezone fixes (yes BRU should work!!!), environment security fixes, lots of paranoia and exploit-prevention enhancements, fixed threading, resolver code security fixes * (28-May-1998) A general updated version of glibc is now required to remain compatible with current and future security updates. * (18-Apr-1998) Security Fix: A bug in glibc has been discovered that allows for a denial of service attack in ftpd. The following packages correct this problem and all users of Red Hat Linux 5.0 using ftpd should upgrade. As always, these packages have been signed with the Red Hat PGP key. * (01-Apr-1998) New glibc packages are available now on the ftp site. These new packages fix (finally!) the problems in the dynamic loader code. Applications compiled for glibc using a lot of shared objects should now work reliably under glibc. Also various fixes to the sigprocmask handlers are in place. * (20-Mar-1998) The new glibc packages fix problems in the NIS client and a series of bugs in the dynamic loader code. This update requires that the texinfo package also be upgraded. * (10-Mar-1998) There is a small problem with the portmap rpm that came with 5.0 in the %post section of the install that messes up the initscript. To avoid this problem, add the --noscripts option to upgrade the package, as in: rpm -Uvh --noscripts portmap-4.0-8.i386.rpm * (17-Dec-1997)Security Fix: Some security problems have been found in glibc's resolver and portmap code. * (22-Dec-1997) When using NIS, groups with more than one key in the group file couldn't log into the system. This was a result of glibc * (20-Jan-1997) NIS stuff and other misc problems fixed. The vast majority of users only need the first two, but you need to upgrade to amd-920824upl102-11 and portmap-4.0-8 at the same time, or those services will stop working. * (28-Jan-1997) Updated version. Solution: * Intel: Upgrade to: [98]glibc-2.0.7-19.i386.rpm [99]glibc-debug-2.0.7-19.i386.rpm [100]glibc-devel-2.0.7-19.i386.rpm [101]glibc-profile-2.0.7-19.i386.rpm [102]amd-920824upl102-11.i386.rpm [103]portmap-4.0-8.i386.rpm [104]texinfo-3.12-1.i386.rpm * Alpha: Upgrade to [105]glibc-2.0.7-19.alpha.rpm [106]glibc-debug-2.0.7-19.alpha.rpm [107]glibc-devel-2.0.7-19.alpha.rpm [108]glibc-profile-2.0.7-19.alpha.rpm [109]amd-920824upl102-11.alpha.rpm [110]portmap-4.0-8.alpha.rpm [111]texinfo-3.12-1.alpha.rpm _________________________________________________________________ Package: samba Updated: 14-Jul-1998 Problem: * (14-Jul-1998) Security Fix: Serious security problems have been found in all versions of Samba shipped with Red Hat Linux. All users of samba should upgrade to the latest version, and restart samba with: /etc/rc.d/init.d/smb stop; /etc/rc.d/init.d/smb start as soon as possible. Solution: * Alpha: Upgrade to [112]samba-1.9.18p7-2.alpha.rpm * Intel: Upgrade to [113]samba-1.9.18p7-2.i386.rpm _________________________________________________________________ Package: rpm Updated: 02-Jul-1998 Problem: * (02-Jul-1998) RPM reports problems with failed trigger scripts * (28-May-1998) A newer version of RPM is needed to be able to upgrade security releases from now on. * (31-Dec-1997)Security Fix: This fixes problems with RPM's --setperms option setting improper permissions on files. * (08-Jan-1998)Many fixes such as the ftp fix have been added. Solution: * Intel: Upgrade to: [114]rpm-2.5.2-1.i386.rpm [115]rpm-devel-2.5.2-1.i386.rpm * Alpha: Upgrade to: [116]rpm-2.5.2-1.alpha.rpm [117]rpm-devel-2.5.2-1.alpha.rpm _________________________________________________________________ Package: libtermcap Updated: 02-Jul-1998 Problem: * (02-Jul-1998) Security Fix: Security problems have been found that allow local users to gain root access. All Red Hat users should upgrade. Solution: * Intel: Upgrade to [118]libtermcap-2.0.8-9.i386.rpm * Alpha: Upgrade to [119]libtermcap-2.0.8-9.alpha.rpm _________________________________________________________________ Package: bind Updated: 30-Apr-1998 Problem: * (30-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (09-Apr-1998) Security Fix: Major security problems have been found in all versions of bind which affect Red Hat Linux on all platforms. All users running bind hould upgrade as soon as possible. After upgrading to the new package, you must restart bind. To do so, issue the following: /etc/rc.d/init.d/named stop /etc/rc.d/init.d/named start Thanks to CERT and the ISC for their handling of this problem (CA-98.05). Solution: * Intel: Upgrade to [120]bind-4.9.7-1.i386.rpm * Alpha: Upgrade to [121]bind-4.9.7-1.alpha.rpm _________________________________________________________________ Package: tin Updated: 30-Jun-1998 Problem: * (30-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. Solution: * Intel: Upgrade to [122]tin-1.22-8.1.i386.rpm * Alpha: Upgrade to [123]tin-1.22-8.1.alpha.rpm _________________________________________________________________ Package: slang Updated: 30-Jun-1998 Problem: * (30-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. Solution: * Intel: Upgrade to [124]slang-0.99.38-2.1.i386.rpm * Alpha: Upgrade to [125]slang-0.99.38-2.1.alpha.rpm _________________________________________________________________ Package: metamail Updated: 30-Jun-1998 Problem: * (30-Jun-1998) Security Fix: More problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (23-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (01-Jun-1998) Security Fix: The metamail package has security problems. Thanks to Chris Evans for finding this problem. Solution: * Intel: Upgrade to [126]metamail-2.7-17.i386.rpm * Alpha: Upgrade to [127]metamail-2.7-17.alpha.rpm _________________________________________________________________ Package: mailx Updated: 30-Jun-1998 Problem: * (30-Jun-1998) Security Fix: More problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (23-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (12-Jun-1998) Security Fix: /tmp races have been found in the mailx package. All users of Red Hat Linux should upgrade this package. Solution: * Intel: Upgrade to [128]mailx-8.1.1-3.i386.rpm * Alpha: Upgrade to [129]mailx-8.1.1-3.alpha.rpm _________________________________________________________________ Package: elm Updated: 23-Jun-1998 Problem: * (23-Jun-1998) Security Fix: Various problems have been found by the Linux Security Auditing Team. All Red Hat users should upgrade. * (26-Jan-1998)Security Fix: Filter commands have been removed for buffer overflows. Procmail should be used in place of the filter option. Solution: * Intel: Upgrade to [130]elm-2.4.25-14.i386.rpm * Alpha: Upgrade to [131]elm-2.4.25-14.alpha.rpm _________________________________________________________________ Package: findutils Updated: 10-Jun-1998 Problem: * (10-Jun-1998) Security Fix: Various, minor security problems were found in this package. Thanks to Kevin Vajk and Emmanuel Galanos for helping out with these. * (09-Mar-1998) Security Fix: The findutils package has various temporary file creation race conditions. These bugs allow local users to create at least denial of service conditions and may allow local users to gain root access to affected systems. All systems with local users that do not have the root password should have these fixes applied. The fixes are available for Red Hat Linux 5.0. As always, these packages have been signed with the Red Hat PGP key. Solution: * Intel: Upgrade to [132]findutils-4.1-24.i386.rpm * Alpha: Upgrade to [133]findutils-4.1-24.alpha.rpm _________________________________________________________________ Package: xscreensaver Updated: 10-Jun-1998 Problem: * (10-Jun-1998) Security Fix: Various, minor security problems were found in this package. Thanks to Jamie Zawinski for fixing this. Solution: * Intel: Upgrade to [134]xscreensaver-2.16-4.i386.rpm * Alpha: Upgrade to [135]xscreensaver-2.16-4.alpha.rpm _________________________________________________________________ Package: dhcp Updated: 02-Jun-1998 Problem: * (02-Jun-1998) Security Fix: A new version of the ISC dhcp daemon is now available, which fixes many security concerns. Users of Red Hat 5.0 with the package called dhcpd should upgrade to the new release immediately. After upgrading, be sure to restart the dhcp daemon with the following command: /etc/rc.d/init.d/dhcpd restart Thanks to Chris Evans for pointing out these problems and to the ISC for the fix. Solution: * Intel: Upgrade to [136]dhcp-2.0b1pl1-2.i386.rpm * Alpha: Upgrade to [137]dhcp-2.0b1pl1-2.alpha.rpm _________________________________________________________________ Package: minicom Updated: 02-Jun-1998 Problem: * (02-Jun-1998) Security Fix: Buffer overflows have been found in the minicom package. Red Hat suggests all users upgrade to a new minicom version immediately. Solution: * Intel: Upgrade to [138]minicom-1.81-3.1.i386.rpm * Alpha: Upgrade to [139]minicom-1.81-3.1.alpha.rpm _________________________________________________________________ Package: dhcpcd Updated: 01-Jun-1998 Problem: * (01-Jun-1998) Security Fix: The dhcpcd package has security problems. Thanks to Chris Evans for finding this problem. After upgrading, you must either reboot your machine or restart the daemon: /etc/rc.d/init.d/network restart Solution: * Intel: Upgrade to [140]dhcpcd-0.65-3.i386.rpm * Alpha: Upgrade to [141]dhcpcd-0.65-3.alpha.rpm _________________________________________________________________ Package: bootp Updated: 01-Jun-1998 Problem: * (01-Jun-1998) Security Fix: The bootp package has security problems. Thanks to Chris Evans for finding this problem. Solution: * Intel: Upgrade to [142]bootp-2.4.3-7.i386.rpm * Alpha: Upgrade to [143]bootp-2.4.3-7.alpha.rpm _________________________________________________________________ Package: lpr Updated: 23-Apr-1998 Problem: * (23-Apr-1998) Security Fix: More buffer overflows have been found in lpr 0.30 as released on Saturday. As these flaws may allow users to gain root access to the local system, Red Hat Software recommends that all users upgrade to lpr 0.31 immediately. Thanks to Niall Smart for finding this problem. * (18-Apr-1998) Security Fix: A major security problem has been found in all versions of lpr shipped with Red Hat Linux. Version 0.30 of lpr fixes this and is now available. Red Hat Software encourages all users of Red Hat to upgrade to this new version immediately. Solution: * Intel: Upgrade to [144]lpr-0.31-1.i386.rpm * Alpha: Upgrade to [145]lpr-0.31-1.alpha.rpm _________________________________________________________________ Package: upgrade failure Updated: 20-Apr-1998 Problem: * (08-Dec-1997) Upgrading of systems fail in the "Updating Packages" stage. Users that have a working 4.x system will sometimes get a strange error in which the install fails and exits. Solution: * The first thing to do is login as root and mount the Red Hat Linux 5.0 CD-ROM on the current system. For most users this is done simply by typing: mount /mnt/cdrom If this doesn't work, you may want to view the /etc/fstab for more information on where your CD-ROM is mounted. The next thing to do is enter the RPM directory on the Red Hat Linux 5.0 CD: cd /mnt/cdrom/RedHat/RPMS Then run the RPM upgrade command like so: rpm -Uvh rpm-2.4.10-1glibc.i386.rpm If it won't let you upgrade RPM make sure to use the force and nodeps flags: rpm -Uvh --nodeps --force rpm-2.4.10-1glibc.i386.rpm After doing this there should only be one step left before you reboot and start the upgrade process. This is to rebuild the rpm database which is done by: rpm --rebuilddb This should be the last step and should allow you to upgrade normally. _________________________________________________________________ Package: ypbind Updated: 18-Apr-1998 Problem: * (18-Apr-1998) This updated package corrects some problems when connecting to a non-Linux NIS server. Connecting now works on Alpha as well. These packages have been signed with the Red Hat PGP key. * (26-Jan-1998) Fixes numerous problems with ypservices. Solution: * Intel: Upgrade to: [146]ypbind-3.3-3.i386.rpm [147]yppasswd-0.9-3.i386.rpm * Alpha: Upgrade to: [148]ypbind-3.3-3.alpha.rpm [149]yppasswd-0.9-3.alpha.rpm _________________________________________________________________ Package: procps Updated: 17-Apr-1998 Problem: * (17-Apr-1998) Security Fix: A file creation and corruption bug in XConsole included in procps-X11 versions 1.2.6 and earlier has been found. An exploit which causes a Denial of Service condition preventing anyone other than root from logging into the computer has been found, and others may well be found. Red Hat Software strongly recommends that you upgrade. Thanks to Alan Iwi for finding the bug. Solution: * Intel: Upgrade to: [150]procps-1.2.7-1.i386.rpm [151]procps-X11-1.2.7-1.i386.rpm * Alpha: Upgrade to: [152]procps-1.2.7-1.alpha.rpm [153]procps-X11-1.2.7-1.alpha.rpm _________________________________________________________________ Package: lynx Updated: 01-Apr-1998 Problem: * (01-Apr-1998) Security Fix: Security problems have been found in lynx which allows remote web sites to cause lynx to do unwise things. Red Hat suggests all users of Red Hat Linux upgrade to the new release of lynx. Solution: * Intel: Upgrade to [154]lynx-2.8-1.i386.rpm * Alpha: Upgrade to [155]lynx-2.8-1.alpha.rpm _________________________________________________________________ Package: kbd Updated: 25-Mar-1998 Problem: * (25-Mar-1998) Security Fix: /tmp exploits have been found in this package. The new packages have been signed with Red Hat's PGP key. Solution: * Intel: Upgrade to [156]kbd-0.94-6.i386.rpm * Alpha: Upgrade to [157]kbd-0.94-6.alpha.rpm _________________________________________________________________ Package: mh Updated: 21-Mar-1998 Problem: * (21-Mar-1998) Security Fix: Buffer overflows have been found in msgchk as included with the mh package in all versions of Red Hat. These overflows allow all users to gain root access to systems with them installed, and are distinct from the problems found in earlier versions of mh. If you do not need the mh package, the easiest fix for this problem is to: rpm -e mh If you do need it, fixes are available for users of Red Hat 5.0. As always, these packages have been signed with the Red Hat PGP key. * (20-Jan-1998) Buffer overflows that allow users to gain root access. Solution: * Intel: Upgrade to [158]mh-6.8.4-6.i386.rpm * Alpha: Upgrade to [159]mh-6.8.4-6.alpha.rpm _________________________________________________________________ Package: ncftp Updated: 20-Mar-1998 Problem: * (20-Mar-1998) Security Fix: All versions of ncftp packages for Red Hat Linux have /tmp symlink attacks. New packages are available for Red Hat 5.0 which fix these problems. All users of Red Hat Linux are encouraged to upgrade to the new ncftp releases immediately. As always, these packages have been signed with the Red Hat PGP key. Thanks to the contributors of BUGTRAQ for finding and fixing this bug. Solution: * Intel: Upgrade to [160]ncftp-2.4.3-1.i386.rpm * Alpha: Upgrade to [161]ncftp-2.4.3-1.alpha.rpm _________________________________________________________________ Package: perl Updated: 10-Mar-1998 Problem: * (10-Mar-1998) Fixes a seg fault condition when using POSIX's strftime() function. This was missed in yesterday's release. :( * (09-Mar-1998) Security Fix: All versions of perl for Red Hat Linux have /tmp symlink attacks. New packages are available for Red Hat 5.0 which fix these problems. The updates have been PGP signed with the Red Hat public key to ensure their authenticity. * (05-Dec-1997) Various /var/tmp paths remain in Config.pm, breaking installs of 3rd party modules. Solution: * Intel: Upgrade to [162]perl-5.004-4.i386.rpm * Alpha: Upgrade to [163]perl-5.004-4.alpha.rpm _________________________________________________________________ Package: textutils Updated: 09-Mar-1998 Problem: * (09-Mar-1998) Security Fix: The textutils package has various temporary file creation race conditions. These bugs allow local users to create at least denial of service conditions and may allow local users to gain root access to affected systems. All systems with local users that do not have the root password should have these fixes applied. The fixes are available for Red Hat Linux 4.2. As always, these packages have been signed with the Red Hat PGP key. Solution: * Intel: Upgrade to [164]textutils-1.22-5.i386.rpm * Alpha: Upgrade to [165]textutils-1.22-5.alpha.rpm _________________________________________________________________ Package: pine Updated: 30-Dec-1997 Problem: * (18-Dec-1997) pine locks when sending out a message after you invoke the alternate editor to compose a message. * (30-Dec-1997) Fixes window resizing problems (neither pine, nor pico were resizing properly * (08-Feb-1998) Corrects problems using external filters. Solution: * Intel: Upgrade to [166]pine-3.96-7.i386.rpm * Alpha: Upgrade to [167]pine-3.96-7.alpha.rpm _________________________________________________________________ Package: bru Updated: 05-Feb-1998 Problem: * (31-Dec-1997) These new packages fix a bug in BRU2000 that did not allow the -Xi option to be passed. * (05-Feb-1998) For people who are in the "GB" timezone (the UK), you may need to set your timezone to "GMT+0" as a temporary fix for some current BRU problems. Solution: * These upgrades are available in rhmask-ed RPM . We have created these rhmask-ed images to update BRU Here is how to use them: 1. Get the following files listed below and place them in /tmp: Intel: Upgrade to: [168]BRU2000-15.0P-2.i386.rpm.rhmask [169]BRU2000-X11-15.0P-2.i386.rpm.rhmask Alpha:Upgrade to: [170]BRU2000-15.0P-2.alpha.rpm.rhmask [171]BRU2000-X11-15.0P-2.alpha.rpm.rhmask 2. Make sure the rhmask utility is installed on your system: rpm -q rhmask If rhmask is installed, you should see a message similar to the following: rhmask-1.0-2 If it's not already installed, place the CD in the CD-ROM and install it: mount /mnt/cdrom cd /mnt/cdrom/RedHat/RPMS rpm -Uvh rhmask-1.0-2.*.rpm 3. Locate your original BRU2000 packages on the CD: ls -l /mnt/cdrom/RedHat/RPMS/BRU2000*.rpm 4. Now unmask the BRU2000 upgrades: cd /tmp cp /mnt/cdrom/RedHat/RPMS/BRU2000*.rpm . rhmask BRU2000-15.0P-1.*.rpm BRU2000-15.0P-2.*.rpm.rhmask rhmask BRU2000-X11-15.0P-1.*.rpm BRU2000-X11-15.0P-2.*.rpm.rhmask 5. The packages can now be installed: cd /tmp rpm -Uvh BRU2000-15.0P-2.*.rpm _____________________________________________________________ Package: gzip Updated: 28-Jan-1998 Problem: + (28-Jan-1998)The executable gzexe , part of the gzip package, uses files in /tmp withh very predictable names. This can allow users to destroy contents of files on your system. As most systems do not use gzexe, this is potentially not a problem. However, Red Hat reccomends upgrading to the new versions to avoid future problems. Solution: + Intel: Upgrade to: [172]gzip-1.2.4-10.i386.rpm + Alpha: Upgrade to: [173]gzip-1.2.4-10.alpha.rpm _____________________________________________________________ Package: ppp Updated: 26-Jan-1998 Problem: + (26-Jan-1998) Properly pamified (works with shadow). Also fixes problems setting routes. Solution: + Intel: Upgrade to: [174]ppp-2.3.3-2.i386.rpm + Alpha: Upgrade to: [175]ppp-2.3.3-2.alpha.rpm _____________________________________________________________ Package: tmpwatch Updated: 26-Jan-1998 Problem: + (13-Jan-1998) Fixes --test and /etc/cron.daily/tmpwatch is no longer empty. + (26-Jan-1998)Now runs automatically (the script was empty). and honors --test flag. Solution: + Intel: Upgrade to: [176]tmpwatch-1.5-1.i386.rpm + Alpha: Upgrade to: [177]tmpwatch-1.5-1.alpha.rpm _____________________________________________________________ Package: gated Updated: 19-Jan-1998 Problem: + (19-Jan-1998) Many bugfixes for OSPF area selection problems and IFF_LOOPBACK flag problems fixed. Solution: + Intel: Upgrade to [178]gated-3.5.8-1.i386.rpm + Alpha: Upgrade to [179]gated-3.5.8-1.alpha.rpm _____________________________________________________________ Package: quota Updated: 13-Jan-1998 Problem: + (13-Jan-1998) Now includes rpc.rquotad which was missing. Solution: + Intel: Upgrade to [180]quota-1.55-7.i386.rpm + Alpha: Upgrade to [181]quota-1.55-7.alpha.rpm _____________________________________________________________ Package: dump Updated: 31-Dec-1997 Problem: + (31-Dec-1997) Works properly with partitions > 2 gigs. Solution: + Intel: Upgrade to [182]dump-0.3-11.i386.rpm + Alpha: Upgrade to [183]dump-0.3-11.alpha.rpm _____________________________________________________________ Package: shadow-utils Updated: 31-Dec-1997 Problem: + (31-Dec-1997) Fixes a problem with useradd core dumping on commands like: useradd -G wheel -d /home/newuser -n newuser The -G wheel previously broke things. Solution: + Intel: Upgrade to [184]shadow-utils-970616-11.i386.rpm + Alpha: Upgrade to [185]shadow-utils-970616-11.alpha.rpm _____________________________________________________________ Package: trn Updated: 30-Dec-1997 Problem: + (30-Dec-1997) Fixes the problem with ctrl-z not suspending Solution: + Intel: Upgrade to [186]trn-3.6-11.i386.rpm + Alpha: Upgrade to [187]trn-3.6-11.alpha.rpm _____________________________________________________________ Package: ircii Updated: 30-Dec-1997 Problem: + (30-Dec-1997) Fixes the problem with ctrl-z not suspending Solution: + Intel: Upgrade to: [188]ircii-2.8.2-13.i386.rpm [189]ircii-help-2.8.2-13.i386.rpm + Alpha: Upgrade to: [190]ircii-2.8.2-13.alpha.rpm [191]ircii-help-2.8.2-13.alpha.rpm _____________________________________________________________ Package: util-linux Updated: 29-Dec-1997 Problem: + (05-Dec-1997) vipw seg faults. This causes /etc/ptmp around, which breaks both chfn and chsh. Remove this file if is exists + (22-Dec-1997) Fixes bugs in chfn which let users create bad /etc/passwd files. + (29-Dec-1997) Fixes problems with more not suspending with ctrl-z Solution: + Intel: Upgrade to [192]util-linux-2.7-15.i386.rpm + Alpha: Upgrade to [193]util-linux-2.7-15.alpha.rpm _____________________________________________________________ Package: fstool Updated: 17-Dec-1997 Problem: + (17-Dec-1997) fstool has several problems, including improperly removing partitions it cannot find on the system. In particular, a few users have reported that it has been unable to find partitions containing swap space. Solution: + The cabaret program is meant as a replacement for fstool, and does not suffer from several of its problems. Simply remove the fstool program and use cabaret instead: rpm -e fstool /usr/sbin/cabaret _____________________________________________________________ Package: wu-ftpd Updated: 12-Dec-1997 Problem: + (12-Dec-1997) Security Fix: A patch applying preventive measures against a not yet published possible exploit of the FTP server when operating in passive mode. This fix was provided by Olaf Kirch. Solution: + Intel: Upgrade to [194]wu-ftpd-2.4.2b15-6.i386.rpm + Alpha: Upgrade to [195]wu-ftpd-2.4.2b15-6.alpha.rpm _____________________________________________________________ Package: vixie-cron Updated: 12-Dec-1997 Problem: + (12-Dec-1997) A patch was added to prevent exploits of the code, disposing unsafe code portions from the sources. Solution: + Intel: Upgrade to [196]vixie-cron-3.0.1-20.i386.rpm + Alpha: Upgrade to [197]vixie-cron-3.0.1-20.alpha.rpm _____________________________________________________________ Package: joe Updated: 12-Dec-1997 Problem: + (12-Dec-1997) A resize problem when run in terminals which weren't 80x25 in size (either xterm or non-standard Linux consoles) affected joe. Solution: + Intel: Upgrade to [198]joe-2.8-10.i386.rpm + Alpha: Upgrade to [199]joe-2.8-10.alpha.rpm _____________________________________________________________ Package: mouseconfig Updated: 10-Dec-1997 Problem: + (10-Dec-1997) Serial mouse autorpobing remembers proper port Solution: + Intel: Upgrade to [200]mouseconfig-2.22-1.i386.rpm + Alpha: Upgrade to [201]mouseconfig-2.22-1.alpha.rpm _____________________________________________________________ Package: gtk Updated: 10-Dec-1997 Problem: + (10-Dec-1997) Various gtk applications dump core when no DISPLAY is set. Solution: + Intel: Upgrade to: [202]gtk-0.99.970925-3.i386.rpm [203]gtk-devel-0.99.970925-3.i386.rpm + Alpha: Upgrade to: [204]gtk-0.99.970925-3.alpha.rpm [205]gtk-devel-0.99.970925-3.alpha.rpm _____________________________________________________________ Package: window manager failure Updated: 08-Dec-1997 Problem: + (08-Dec-1997) The window manager will not start after upgrading to Red Hat 5.0 Solution: + Due to a bug in previous releases of RedHat Linux, the problem most likely is the .Xclients file in the user's home directory. This file was installed in every user's home directory when a user was added to the system. You will need to delete the .Xclients file: rm -f ~/.Xclients If you want to use the fvwm2 window manager with a different configuration, please note that fvwm2 will not read a configuration from the command line if you invoke it with fvwm2 -f "command" You will need to edit the ~/.Xclients file and change that to fvwm2 -cmd "command" If you use (or want to use) a totally different window manager, you will need to exec it from your .Xclients file. Customized .Xclients files which don't rely on fvwm2 or fvwm95 window managers are not affected by this compatibility problem. _____________________________________________________________ Package: tcp_wrappers-7.6-2 Updated: 05-Dec-1997 Problem: + (05-Dec-1997) setenv in /etc/hosts.allow doesn't work. Solution: + Intel: Upgrade to [206]tcp_wrappers-7.6-2.i386.rpm + Alpha: Upgrade to [207]tcp_wrappers-7.6-2.alpha.rpm _____________________________________________________________ Package: transfig Updated: 03-Dec-1997 Problem: + (03-Dec-1997) XFig cannot export PostScript. Solution: + Intel: Upgrade to [208]transfig-3.2-3.i386.rpm + Alpha: Upgrade to [209]transfig-3.2-3.alpha.rpm _____________________________________________________________ _________________________________________________________________ [210]Feedback | [211]Store | [212]News | [213]Support | [214]Product Errata | [215]About Us | [216]Linux Info | [217]Search | [218]JumpWords [219]No Frames | [220]Show Frames Copyright © 1995-1998 Red Hat Software. [221]Legal notices References 1. mailto:faq-maintainer@redhat.com 2. http://www.redhat.com/support/docs/rhl//intel/rh50-errata-intel.html 3. http://www.redhat.com/support/docs/rhl//alpha/rh50-errata-alpha.html 4. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ 5. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ 6. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#nfs 7. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#XFree86 8. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#apache 9. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#SysVinit 10. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#mutt 11. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#ncurses 12. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#kernel 13. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#imap 14. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#initscripts 15. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#glibc 16. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#samba 17. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#rpm 18. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#libtermcap 19. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#bind 20. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#tin 21. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#slang 22. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#metamail 23. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#mailx 24. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#elm 25. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#findutils 26. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#xscreensaver 27. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#dhcp 28. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#minicom 29. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#dhcpcd 30. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#bootp 31. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#lpr 32. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#upgrade_failure 33. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#ypbind 34. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#procps 35. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#lynx 36. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#kbd 37. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#mh 38. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#ncftp 39. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#perl 40. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#textutils 41. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#pine 42. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#bru 43. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#gzip 44. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#ppp 45. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#tmpwatch 46. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#gated 47. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#quota 48. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#dump 49. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#shadow-utils 50. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#trn 51. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#ircii 52. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#util-linux 53. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#fstool 54. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#wu-ftpd 55. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#vixie-cron 56. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#joe 57. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#mouseconfig 58. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#gtk 59. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#window_manager_failure 60. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#tcp_wrappers-7.6-2 61. http://www.redhat.com/support/docs/rhl//rh50-errata-general.html#transfig 62. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/nfs-server-2.2beta29-7.i386.rpm 63. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/nfs-server-clients-2.2beta29-7.i386.rpm 64. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/nfs-server-2.2beta29-7.alpha.rpm 65. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/nfs-server-clients-2.2beta29-7.alpha.rpm 66. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/Xconfigurator-3.26.1-1.i386.rpm 67. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/XFree86-3.3.2.3-18.i386.rpm 68. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/XFree86-libs-3.3.2.3-18.i386.rpm 69. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/Xconfigurator-3.26.1-1.alpha.rpm 70. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/XFree86-3.3.2.3-18.alpha.rpm 71. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/XFree86-libs-3.3.2.3-18.alpha.rpm 72. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/apache-1.2.6-5.i386.rpm 73. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/apache-1.2.6-5.alpha.rpm 74. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/SysVinit-2.74-4.i386.rpm 75. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/SysVinit-2.74-4.alpha.rpm 76. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/mutt-0.91.1-5.i386.rpm 77. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/mutt-0.91.1-5.alpha.rpm 78. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ncurses-1.9.9e-9.i386.rpm 79. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ncurses-devel-1.9.9e-9.i386.rpm 80. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ncurses-1.9.9e-9.alpha.rpm 81. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ncurses-devel-1.9.9e-9.alpha.rpm 82. http://www.linuxhq.com/kpatch20.html 83. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kernel-2.0.35-2.i386.rpm 84. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kernel-headers-2.0.35-2.i386.rpm 85. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kernel-ibcs-2.0.35-2.i386.rpm 86. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kernel-pcmcia-cs-2.0.35-2.i386.rpm 87. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kernel-source-2.0.35-2.i386.rpm 88. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/modutils-2.1.85-4.i386.rpm 89. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/initscripts-3.67-1.i386.rpm 90. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/kernel-headers-2.0.35-1.alpha.rpm 91. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/kernel-source-2.0.35-1.alpha.rpm 92. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/initscripts-3.67-1.alpha.rpm 93. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/imap-4.1.final-1.i386.rpm 94. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/imap-4.1.final-1.alpha.rpm 95. http://www.redhat.com/support/docs/rhl//intel/rh50-errata-intel.html 96. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/initscripts-3.67-1.i386.rpm 97. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/initscripts-3.67-1.alpha.rpm 98. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/glibc-2.0.7-19.i386.rpm 99. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/glibc-debug-2.0.7-19.i386.rpm 100. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/glibc-devel-2.0.7-19.i386.rpm 101. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/glibc-profile-2.0.7-19.i386.rpm 102. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/amd-920824upl102-11.i386.rpm 103. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/portmap-4.0-8.i386.rpm 104. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/texinfo-3.12-1.i386.rpm 105. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/glibc-2.0.7-19.alpha.rpm 106. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/glibc-debug-2.0.7-19.alpha.rpm 107. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/glibc-devel-2.0.7-19.alpha.rpm 108. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/glibc-profile-2.0.7-19.alpha.rpm 109. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/amd-920824upl102-11.alpha.rpm 110. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/portmap-4.0-8.alpha.rpm 111. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/texinfo-3.12-1.alpha.rpm 112. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/samba-1.9.18p7-2.alpha.rpm 113. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/samba-1.9.18p7-2.i386.rpm 114. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/rpm-2.5.2-1.i386.rpm 115. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/rpm-devel-2.5.2-1.i386.rpm 116. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/rpm-2.5.2-1.alpha.rpm 117. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/rpm-devel-2.5.2-1.alpha.rpm 118. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/libtermcap-2.0.8-9.i386.rpm 119. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/libtermcap-2.0.8-9.alpha.rpm 120. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/bind-4.9.7-1.i386.rpm 121. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/bind-4.9.7-1.alpha.rpm 122. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/tin-1.22-8.1.i386.rpm 123. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/tin-1.22-8.1.alpha.rpm 124. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/slang-0.99.38-2.1.i386.rpm 125. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/slang-0.99.38-2.1.alpha.rpm 126. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/metamail-2.7-17.i386.rpm 127. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/metamail-2.7-17.alpha.rpm 128. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/mailx-8.1.1-3.i386.rpm 129. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/mailx-8.1.1-3.alpha.rpm 130. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/elm-2.4.25-14.i386.rpm 131. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/elm-2.4.25-14.alpha.rpm 132. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/findutils-4.1-24.i386.rpm 133. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/findutils-4.1-24.alpha.rpm 134. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/xscreensaver-2.16-4.i386.rpm 135. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/xscreensaver-2.16-4.alpha.rpm 136. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/dhcp-2.0b1pl1-2.i386.rpm 137. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/dhcp-2.0b1pl1-2.alpha.rpm 138. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/minicom-1.81-3.1.i386.rpm 139. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/minicom-1.81-3.1.alpha.rpm 140. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/dhcpcd-0.65-3.i386.rpm 141. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/dhcpcd-0.65-3.alpha.rpm 142. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/bootp-2.4.3-7.i386.rpm 143. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/bootp-2.4.3-7.alpha.rpm 144. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/lpr-0.31-1.i386.rpm 145. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/lpr-0.31-1.alpha.rpm 146. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ypbind-3.3-3.i386.rpm 147. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/yppasswd-0.9-3.i386.rpm 148. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ypbind-3.3-3.alpha.rpm 149. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/yppasswd-0.9-3.alpha.rpm 150. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/procps-1.2.7-1.i386.rpm 151. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/procps-X11-1.2.7-1.i386.rpm 152. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/procps-1.2.7-1.alpha.rpm 153. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/procps-X11-1.2.7-1.alpha.rpm 154. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/lynx-2.8-1.i386.rpm 155. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/lynx-2.8-1.alpha.rpm 156. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/kbd-0.94-6.i386.rpm 157. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/kbd-0.94-6.alpha.rpm 158. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/mh-6.8.4-6.i386.rpm 159. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/mh-6.8.4-6.alpha.rpm 160. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ncftp-2.4.3-1.i386.rpm 161. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ncftp-2.4.3-1.alpha.rpm 162. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/perl-5.004-4.i386.rpm 163. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/perl-5.004-4.alpha.rpm 164. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/textutils-1.22-5.i386.rpm 165. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/textutils-1.22-5.alpha.rpm 166. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/pine-3.96-7.i386.rpm 167. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/pine-3.96-7.alpha.rpm 168. ftp://ftp.redhat.com/pub/redhat/updates/bru/i386/BRU2000-15.0P-2.i386.rpm.rhmask 169. ftp://ftp.redhat.com/pub/redhat/updates/bru/i386/BRU2000-X11-15.0P-2.i386.rpm.rhmask 170. ftp://ftp.redhat.com/pub/redhat/updates/bru/alpha/BRU2000-15.0P-2.alpha.rpm.rhmask 171. ftp://ftp.redhat.com/pub/redhat/updates/bru/alpha/BRU2000-X11-15.0P-2.alpha.rpm.rhmask 172. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/gzip-1.2.4-10.i386.rpm 173. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/gzip-1.2.4-10.alpha.rpm 174. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ppp-2.3.3-2.i386.rpm 175. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ppp-2.3.3-2.alpha.rpm 176. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/tmpwatch-1.5-1.i386.rpm 177. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/tmpwatch-1.5-1.alpha.rpm 178. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/gated-3.5.8-1.i386.rpm 179. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/gated-3.5.8-1.alpha.rpm 180. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/quota-1.55-7.i386.rpm 181. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/quota-1.55-7.alpha.rpm 182. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/dump-0.3-11.i386.rpm 183. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/dump-0.3-11.alpha.rpm 184. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/shadow-utils-970616-11.i386.rpm 185. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/shadow-utils-970616-11.alpha.rpm 186. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/trn-3.6-11.i386.rpm 187. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/trn-3.6-11.alpha.rpm 188. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ircii-2.8.2-13.i386.rpm 189. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/ircii-help-2.8.2-13.i386.rpm 190. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ircii-2.8.2-13.alpha.rpm 191. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/ircii-help-2.8.2-13.alpha.rpm 192. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/util-linux-2.7-15.i386.rpm 193. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/util-linux-2.7-15.alpha.rpm 194. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/wu-ftpd-2.4.2b15-6.i386.rpm 195. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/wu-ftpd-2.4.2b15-6.alpha.rpm 196. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/vixie-cron-3.0.1-20.i386.rpm 197. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/vixie-cron-3.0.1-20.alpha.rpm 198. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/joe-2.8-10.i386.rpm 199. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/joe-2.8-10.alpha.rpm 200. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/mouseconfig-2.22-1.i386.rpm 201. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/mouseconfig-2.22-1.alpha.rpm 202. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/gtk-0.99.970925-3.i386.rpm 203. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/gtk-devel-0.99.970925-3.i386.rpm 204. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/gtk-0.99.970925-3.alpha.rpm 205. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/gtk-devel-0.99.970925-3.alpha.rpm 206. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/tcp_wrappers-7.6-2.i386.rpm 207. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/tcp_wrappers-7.6-2.alpha.rpm 208. ftp://ftp.redhat.com/pub/redhat/updates/5.0/i386/transfig-3.2-3.i386.rpm 209. ftp://ftp.redhat.com/pub/redhat/updates/5.0/alpha/transfig-3.2-3.alpha.rpm 210. http://www.redhat.com/email.html 211. http://www.redhat.com/products/ 212. http://www.redhat.com/news/ 213. http://www.redhat.com/support/ 214. http://www.redhat.com/support/docs/errata.html 215. http://www.redhat.com/redhat/ 216. http://www.redhat.com/linux-info/ 217. http://www.redhat.com/search/ 218. http://www.redhat.com/jumplist.phtml 219. http://www.redhat.com/cgi-bin/frames.phtml?fr=n 220. http://www.redhat.com/cgi-bin/frames.phtml?fr=y 221. http://www.redhat.com/redhat/website.html#legal