![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Updates for the Sun Cobalt RaQ4
Downloads MUST be applied from the bottom of the page to the top, as they must be applied in chronlogical order.
Application of these patches in improper order will likely result in problems with the Sun Cobalt product.
FTP ACCESS IS NO LONGER AVAILABLE BIND 9.9.11
This is a Security Update for the DNS Server. It's 9-1-2017 and the Raq4 is Still Current with BIND! Pre-Requisites: Reboot Required: no MD5 Check Sum: 10787cfc053decae393511d79f83e6b5
BIND 9.9.2
This is a Security Update for the DNS Server. It's 1-25-2013 and the Raq4 is Still Current with BIND! Pre-Requisites: Reboot Required: no MD5 Check Sum: ecf75cee6cefc65df7610b302ef14f28
BIND 9.7.6-P1
This is a Security Update for the DNS Server. It's 6-29-2012 and the Raq4 is Still Current with BIND! Pre-Requisites: Reboot Required: no MD5 Check Sum: 04d00e06ee9a8ec36d5cc9e155b450ce
Apache OpenSSL 0.9.8r
This Updates Apache's OpenSSL and closes various Security Holes! Pre-Requisites: Reboot Required: yes MD5 Check Sum: 9d97595cd70da34e5803fdfcbc7cb7ff
Proftpd 1.3.3e
The Upgrades the FTP server. Pre-Requisites: Reboot Required: no MD5 Check Sum: 9de6fbf35714b8ce3341629cca8897c7
Sendmail 8.14.5
This Upgrades Sendmail to 8.14.5
Using my CF Builder is strongly suggested. You can get the CF Builder Here. Pre-Requisites: Reboot Required: yes MD5 Check Sum: bccc905f2a8b996c472c66491e5c1609
BIND 9.7.3-P3.1.Z2
This is a Security Update for the DNS Server. It's 7-7-2011 and the Raq4 is Current with BIND. Who would of Thunk? Pre-Requisites: Reboot Required: no MD5 Check Sum: 8c18acd070562ae71441bacbafa495c5
BIND 9.7.2-P3.1.Z2
This is a Security Update for the DNS Server. It's 1-1-2011 and the Raq4 is Current with BIND. Who would of Thunk? Pre-Requisites: Reboot Required: no MD5 Check Sum: ada3f150794da6ed0e033dda3a1addca
Sendmail 8.14.4 message logging Upgrade
This Upgrades Sendmail to 8.14.4 and adds the ability to log all messages going through the system
Simply add the following to the bottom of your mc file. Using my CF Builder is strongly suggested. You can get the CF
Builder Here. LOCAL_CONFIG D{LogAll}/home/log/mail.log D{LogExc}X-Mailing-List Pre-Requisites: Reboot Required: yes MD5 Check Sum: f6fe91b6045e49835f65d427c31fe4dc
BIND 9.4.2-P2-Z2
This is a Security Update for the DNS Server. Pre-Requisites: Reboot Required: no MD5 Check Sum: fbed4706706303df80a7a750d8face00
BIND 9.4.2-P2
This is a Security Update for the DNS Server. Pre-Requisites: Reboot Required: no MD5 Check Sum: 3a67529296573a44565113123b41082c
BIND 9.4.2-P1
This is a Security Update for the DNS Server. Pre-Requisites: Reboot Required: no MD5 Check Sum: d9c7d205961c47fc4aefff17c5c56a7f
Security-Update-4.4.8
This package updates PHP to 4.4.8, ImageMagick to 6.4.1, and curl to 7.18.1 This also Upgrades the system to include dcraw, jasper, jbigkit, libfpx, and Python 2.3. Click here for the phpinfo page. Pre-Requisites: Reboot Required: yes MD5 Check Sum: ef7523348cd140158c4a568aa47f7970
Sendmail 8.14.3 Upgrade
This Upgrades Sendmail to 8.14.3 and includes new config options for spam fighting. These include...
Pre-Requisites: Reboot Required: yes MD5 Check Sum: 4c6a997682fa25872f8e13ad12af3657
BIND 9.4.2 Upgrade
This upgrades the BIND software from 8.x to 9.x. I strongly suggest you install this on all your nameservers.
ISC announced BIND 8 to be End of Life as August 27 2007.
Please Note: This update includes new sections in the "DNS Server Settings" section of the gui. These sections include...
Pre-Requisites: Reboot Required: no MD5 Check Sum: 8384a162a823816679b103cf5120472b
Apache 1.3.41 mod_ssl 2.8.31-1.3.41 mod_perl 1.30 OpenSSL 0.9.8g
This updates the Apache daemon to 1.3.41 and includes the the ability to use RBL's
Example .htaccess
Pre-Requisites: Reboot Required: yes MD5 Check Sum: cb8801480ba93d5f24543b85f8e95a76
Glibc Timezone Update
This updates the Glibc timezone files to the 2007c version Pre-Requisites: Reboot Required: yes MD5 Check Sum: 713fb69ff91a1c0b2209c07b087fcd2d
Sendmail 8.13.8 Security Upgrade
This Upgrades Sendmail to 8.13.8 and cyrus sasl to 1.5.24
Pre-Requisites: Reboot Required: yes MD5 Check Sum: 81f800d94881c0ac249b940b4acde903
Apache 1.3.37 mod_ssl 2.8.28-1.3.37 mod_perl 1.29 OpenSSL 0.9.8d
This Updates the Apache Webserver Program and closes various Security Holes! Pre-Requisites: Reboot Required: yes MD5 Check Sum: e8b44ad0aedc6bde750b8f4601b116d8
PHP 4.4.4 Security Upgrade
This build of PHP is based on the last Sun Cobalt PHP 4.06 and the once very popular pkgmaster PHP 4.1.2 which is now very
outdated and should never be used anymore... This version includes multiple enhancements including added support for
the following...
The Package contains the following NOTE: Interbase and pdflib are no longer supported. curl, wddx, and mm are no longer built as "shared"... Postgres support is built as "shared" you will need to activate it your /etc/httpd/php.ini if you want to use it. Pre-Requisites: Reboot Required: yes MD5 Check Sum: 7a89795eeb8a56a7ae934040837a14ee
MySQL 3.23.58 MyODBC-2.50.39 unixODBC-2.2.3 Perl DBI 1.32 and Perl DBD 1.2219
This installs MySQL, unixODBC, MyODBC and the perl DBD and DBI modules. This is a non-ssl build. Pre-Requisites: Reboot Required: no MD5 Check Sum: 2cfebe5fa70c7ec730143ad5755110db
Qpopper 4.0.9 Release 2
This Upgrades the Qpopper Program. This is a non-ssl version! Pre-Requisites: Reboot Required: yes MD5 Check Sum: 5eeb5d3e9c6dc00f3a11b841180d0581
Proftpd 1.3.0
The Upgrades the FTP server. Pre-Requisites: Reboot Required: no MD5 Check Sum: 919f312d0da1cc7a705cd9d71bbcfff3
Telnet Security Update
This update fixes mulitple security issues with the Telnet program. This is a RE-RELEASE of this update. This Package no longer requires xinetd and now works with the Plain version of the updates. Pre-Requisites: Reboot Required: no MD5 Check Sum: 9de5c1df8055371ea9da90c93d061ff2
BIND 8.4.7
This is a Security Update for the DNS Server. Pre-Requisites: Reboot Required: no MD5 Check Sum: efa97ee4039b9484cf7ddd00644bfab0
Qpopper 4.0.9
This Upgrades the Qpopper Program. This is a non-ssl version! Pre-Requisites: Reboot Required: yes MD5 Check Sum: f4d9df976d65813255f486fb183a8e0a
IMAP 2004g
This Updates the IMAP program. Pre-Requisites: Reboot Required: yes MD5 Check Sum: a08c60f1962c801c92071fb54e3efa1d
OpenSSH 4.3p2
This installs OpenSSH Pre-Requisites: Reboot Required: no MD5 Check Sum: d07736edf011445a52cfd96920dc2615
OpenSSL 0.9.7a-33.17.Z1 Security Update
This updates OpenSSL on servers with the OS-UPDATE and installs OpenSSL on servers without the OS-UPDATE Pre-Requisites: Reboot Required: no MD5 Check Sum: 2dd3f8b1b818af9622c7fec5665838da
PopRelayD Checkbox Fix 1.0
This Fixes the POP Before SMTP Relaying Checkbox (Control Panel > Email Server Parameters...) so it stays on.
This update is OPTIONAL if your POP Before SMTP Relaying Checkbox is working ok. (It could happen but it probley means
you need to do a lot of updates before this one or you don't use it...) Pre-Requisites: Reboot Required: no MD5 Check Sum: 66021a7962c973815954e12e858966ce
Standard ISO Version 1 Updates Stop HERE!Bind 8.4.6 Upgrade.
This updates your DNS Server to the current version of bind. Pre-Requisites: Reboot Required: no MD5 Check Sum: 4c4c09dd37855fc767e7bd65fb89696b
Bind 8.4.5 Upgrade.
This upgrades your DNS Server to the current version of bind. This pkg includes an updated version of...
Pre-Requisites: Reboot Required: Yes MD5 Check Sum: 9385ca3b9890fb31158768903194746c
Apache, OpenSSL, and Mod_SSL Upgrade.
This update fixes several security vulnerabilities. This pkg includes an updated...
Pre-Requisites: Reboot Required: Yes MD5 Check Sum: be3e0daaa8ed329f1ad9c8bf43151ed5
NOTICEThe Official Sun Cobalt Updates End Here!Please note that you are using these updates at your own risk and I do not provide free support for them. If you have problems you should try installing the pkgs from the command line and watch for any error messages... These pkg files also represent a basic change in the way updates have been made in the past... While most software was "patched" in the past, it will be my goal to build updated pkgs equivalent to the now Current RedHat Enterprise 3 or best... I will be doing my very best to avoid building "patched" versions of old software however in some places there is no choice.
Mutt Security Update 2.0.1
This update fixes security vulnerabilities with mutt. Pre-Requisites: Reboot Required: No MD5 Check Sum: 4a1b391bc789cd469fbcb20f1fe2eb55
ProFTPD Security Update 2.0.1
This update addresses a buffer overflow vulnerability with ProFTPD. Pre-Requisites: Reboot Required: No MD5 Check Sum: d47fcf99b19603d5096a18e63d3f5c72
Pine Security Update 2.0.1
This patch fixes security vulnerabilities in Pine. Pre-Requisites: Reboot Required: No MD5 Check Sum: 5173af407a7acffbd47d300d48279266
Fileutils Security Update 2.0.1
This updates address a remote denial of services vulnerability in the ls program, a utility that is part of the fileutils package. Pre-Requisites: Reboot Required: No MD5 Check Sum: 0160b0e292073272a0062e3ed64c8e1d
Rsync Security Update 2.0.1
This update addresses a heap overflow vulnerability in rsync, is a program for sychronizing files over the network. Pre-Requisites: Reboot Required: No MD5 Check Sum: 982e0aee16bfef2c7bf6941fd82a2134
BIND Security Update 2.0.1
This update addresses a vulnerability in BIND, that could allow an attacker to conduct cache poisoning attacks on the name servers by convincing the servers to retain invalid negative responses. For more information, see: CAN-2003-0914 Pre-Requisites: Reboot Required: No MD5 Check Sum: 3ccc453abf220577299a29602147e8aa
Slocate Security Update 2.0.1
This update addresses a vulnerability in slocate where the heap management structures could be corrupted possibly lead to an
attacker gaining slocate group
privileges.
Reboot Required: No MD5 Check Sum: 7da97b57a3e721a506f95159337dc18e
Tcpdump Security Update 2.0.1
This update adresses a vulnerability in tcpdump, where the privileges were not dropped corrextly at startup time. for more information, see: CAN-2003-0194 Pre-Requisites: Reboot Required: No MD5 Check Sum: 68c07c7d46673e2505ce769192557061
Bash Security Update 2.0.1
This update addresses a vulnerability in the bash shell. Temporary files were created with insecure permissions, which could
allow an attacker to launch a symlink attack to overwrite arbitrary files.
Reboot Required: No MD5 Check Sum: 637eeb5554fd973769ca9c2904a24b8a
Sendmail Security Update 2.0.2
This update addresses two vulnerabilities in Sendmail.
Version 2.0.1 ofthe patch did not preserve the configuration file correctly. This updated version (2.0.2) addresses this problem. Pre-Requisites: Reboot Required: No MD5 Check Sum: bbe4af96f826c3476286fdd48ae3497f
NFS-Utils Security Update 2.0.1
This update addresses a buffer overflow in nfs-utils that could be exploited by an attacker, causing a remote Denial of
Service.
Reboot Required: No MD5 Check Sum: 3afb09c7032e5fcd94e5ee291c328d43
Imap Clients Security Update 2.0.1
This update addresses multiple buffer overflow vulnerabilities discovered in various IMAP clients (Pine, Mutt, Imap). Pre-Requisites: Reboot Required: No MD5 Check Sum: 8e61a1e9a313f87d269ceae03f33104d
BIND Security Update 2.0.1
This update addresses multiple vulnerabilities discovered in the Berkeley Internet Name Domain Server (BIND).
Reboot Required: No MD5 Check Sum: c26bbca1ac66a5b759b65afc4c783c31
Unzip Security Update 2.0.1
Updated unzip packages resolve a vulnerability allowing arbitrary files to be overwritten. The original patch to fix this issue (16170) missed a case where the path component included a quoted slash. These updated packages contain a new patch that corrects this issue. for more information, see: CAN-2003-0282 Reboot Required: No MD5 Check Sum: 0768c2e8ebbbc2997026eac6cf15d989
Zlib Security Update 2.0.2
This update addresses a buffer overflow vulnerability in the gzprintf function of the zlib compression package. For more information, see CAN-2003-0107 Version 2 corrects dependency on update 13323 Pre-Requisites: Reboot Required: No MD5 Check Sum: 0d06c35dd17e60482ac87297bbdc2ef9
Maximum Disk Space Update 2.0.1
This update addresses a problem when setting the maximum disk space for a virtual site to a value divisible by 10. Reboot Required: No MD5 Check Sum: 1cf0bfa6f15770a69b63ecf9a387eb6a
Kernel Update C37 2.0.1
This updated kernel fixes a vulnerability in ptrace that could allow local users to obtain full privileges. Remote exploitation of this hole is not possible. For more information see: CAN-2003-0127 This kernel also fixes a problem with the I2C driver where the locks were not IRQ safe. This could cause problems including the system reporting false fan failures, repeated raid syncs, and random reboots. Reboot Required: Yes MD5 Check Sum: a5b1f97c372cb5b517558e141792e3d9
Vim Security Update 2.0.1
This update addresses a vulnerability found in the Vim editor, that could allow attackers to execute arbitrary commands using the libcall feature in modelines. For more information, see CAN-2002-1377 Reboot Required: No MD5 Check Sum: 8b0f0b92200cff373028a338dca568e8
Apache & SSL Security 2.0.1
This update addresses multiple vulnerabilities found in Apache and OpenSSL.
Reboot Required: Yes MD5 Check Sum: 187867bd991cfdd0eab0b8c0e913b0e0
Qpopper Security Update 2.0.1
This update addresses a buffer overflow vulnerability found in Qpopper. Reboot Required: No MD5 Check Sum: 46730b7b3beb48f2ece82730142fd486
Wget Security Update 2.0.1
This update addresses a directory traversal vulnerability in wget. Reboot Required: No MD5 Check Sum: a010a4c05392cc1486ca0f2d7dfa4125
Pine & File Security Update 2.0.1
This update addresses vulnerabilities found in the pine mail program and the file program. Pine was vulnerable to a remote denial of service. For more information, see http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 File was vulnerable to a local buffer overflow. For more information, see http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0102 Reboot Required: No MD5 Check Sum: 2e13e4520140d9bd3ef7e0a1e1d1f9c0
Glibc Security Update 2.0.1
This update addresses a security vulnerability in the glibc resolver. For more information, see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1146 Reboot Required: Yes MD5 Check Sum: cbcbb45e653b62c9005e7de2347c2173
Sendmail Security Update 2.0.1
This patch updates the Sendmail program on your server to address a buffer overflow vulnerability. See http://www.cert.org/advisories/CA-2003-12.html for more information. Pre-Requisites: Reboot Required: No MD5 Check Sum: 911dd676681b050a6c17e5733c79fb45
Kernel Update 2.0.1 C35
This patch will update your kernel to version 2.2.16-C35. This kernel addresses a RAID issue on the RaQ4 where synchronization of a RAID array could take a long time. Reboot Required: Yes MD5 Check Sum: e778ebe202cca27540d2cf28cb3ca1c8
Sendmail Security Update 2.0.1
This patch updates the Sendmail program on your server to address a remote buffer overflow vulnerability. See http://www.cert.org/advisories/CA-2003-07.html for more information. Reboot Required: No MD5 Check Sum: 8d01bb169854393f6547d2718f8f7f56
PHP & PostgreSQL Security Update 2.0.1
This package addresses several issues with PHP and postgresql. Two PHP bugs have been fixed; the first is arbitrary command execution via the 5th parameter of mail() and the second is URL redirection using fopen(). In Postgresql, multiple buffer overruns have been recently identified and patched. In addition, Postgresql debugging is now disabled by default. Reboot Required: Yes MD5 Check Sum: f4798e1d90d332e23855dd5161ad5496
Root DNS server update 2.0.1
The IP address of one of the root DNS servers (J.ROOT-SERVERS.NET) has been changed. This patch updates the list of root DNS servers on your appliance. Reboot Required: No MD5 Check Sum: f4216e305ee5341a6e6d043667c024a1
Tar & Unzip Security update 2.0.1
The unzip and tar utilities contain vulnerabilities which can allow arbitrary files to be overwritten during archive extraction. See http://www.securityfocus.com/archive/1/196445 for more information. Reboot Required: No MD5 Check Sum: b00b98f358c6bfdd239a188938e930d9
Cgiwrap Update 2.0.1
This package addresses a cross-site scripting vulnerablity with cgiwrap when used with browsers that ignore input before the HTML and BODY tags. Reboot Required: No MD5 Check Sum: 04c0e33304a3225498ac7667ff8b4a55
Proftpd Security Update 2.0.1
This patch fixes an upload file permission issue in proftpd. It also adds an extra security measure by preventing some default system accounts from logging in via ftp Reboot Required: No MD5 Check Sum: 72542c19fca67a688f88ef9f017ffbd0
Util-linux Update 2.0.1
The chfn binary from the util-linux package could be used to gain unauthorized access. Reboot Required: No MD5 Check Sum: 901504d66b3a9d5500dea101765bebce
Kernel Update 2.0.1 C33
Kernel C33 fixes the "do_try_to_free_pages failed" VM problem under heavy load and also adds support for raw I/O. Reboot Required: Yes MD5 Check Sum: 0ea53b2ef29a724c16111c32b167ef17
SHP Removal 2.0.1
This patch removes the SHP package. Customers who installed SHP are advised to
install this patch to remove a serious vulnerability issue. For more
information please see: Reboot Required: Yes MD5 Check Sum: ca100017bc957075ba6b142f337ef0a4
IMAP Update 2.0.2
This patch fixes a Remote Buffer Overflow in imapd. Reboot Required: No MD5 Check Sum: 7e28442e0a713afd91fbe5dadad920ab
Apache & SSL Update 2.0.1
This patch fixes multiple security issues with the Apache HTTP Server and OpenSSL. For more information please see: Reboot Required: Yes MD5 Check Sum: 38264ad4dfcf3f16101385a6ad139178
CGIWrap Update 2.0.1
This package contains an updated CGIWrap that addresses a security issue recently discovered. For more information, please see: http://online.securityfocus.com/bid/3084 Reboot Required: No MD5 Check Sum: 579057707156df964a2e3dbf9f1f18d3
Apache Update 2.0.1
This package contains an updated Apache HTTP Server that addresses a security issue recently discovered. For more information, please see http://httpd.apache.org/info/security_bulletin_20020617.txt MD5 Check Sum: d4055016dca256af3070c866cde2bcae Reboot Required: Yes
TCPDUMP Update 2.0.1
This patch replaces the TCPDUMP network analysis tool with a new version. This version of TCPDUMP contains security fixes for issues that were found in prior releases of TCPDUMP for the Sun Cobalt Server Appliance. MD5 Check Sum: ed01348f71d8ebdaac8065d444a41269 Reboot Required: No
PHP Service Settings Update 2.0.1
This patch fixes a sync issue between what is shown in the web UI and what the actual state is on the server for the PHP service. MD5 Check Sum: 9968454952f9e0dc773a624016df2948 Reboot Required: Yes
Security Bundle Update 2.0.1
This package upgrades the following for a varity of security concerns:
MD5 Check Sum: 08285df27e1420ad8193c689ded57b89 Reboot Required: No
Duplicate Email Alias Update 2.0.1
This patch filters email alias entries preventing duplicate virtusertable entries on your server appliance. MD5 Check Sum: 13151e1c05deb07648056b7f0f1f87c3 Reboot Required: No
PHP Update Update 2.0.1
This patch upgrades the version of the PHP scripting engine on your server appliance. This version of PHP contains security fixes for issues that were found in prior releases of PHP for the Sun Cobalt server appliance. This Update installs PHP version 4.0.6-C4. If you have upgraded PHP through a means other then packages from this website, your changes will be overwritten. MD5 Check Sum: e640b63ed855068d7df58c17d82885a2 Reboot Required: No
glibc Update 2.0.1
This updates the version of glibc to fix a known vulnerability with file globbing functionality. See the following link for details: http://online.securityfocus.com/bid/3707 MD5 Check Sum: af333d0ca687404569c996f2746a4cc1 Reboot Required: Yes
Kernel Update 2.0.1
Updates Kernel version to C32 to fix following security alert. http://www.securityfocus.com/advisories/3607 NOTE: This package is for Sun Cobalt RaQ 4 Non-StaQware systems only. If you have Sun Cobalt StaQware running, please install kernel update at http://www.cobalt.com/support/download/staqwareraq4.html MD5 Check Sum: 7cf79a0da0c91a0de98db51977deb430 Reboot Required: Yes
DNS Update 2.0.1
This package fixes a number of issues within Sun Cobalt's DNS configuration and management interface and it's interactions with the nameserver. Moreover, after this patch, the administrator will have more options in specifying the method of RFC 2317 style reverse subnet delegation. MD5 Check Sum: b489ef028b80ceeb30bf5db2348923f9 Reboot Required: No
OS Update 2.0
This patch is an update to the Sun Cobalt RaQ 4 server appliance. It incorporates all previous patches as well as various bug fixes. See the following PDF for a complete list of bugs addressed in this update. Prerequisites:
RaQ4-en-OSUpdate-Installation.pdf MD5 Check Sum: bd95b7cf9302cb9b7c335f99863889eb Reboot Required: Yes
Kernel Update 1.0.1
Kernel C24 and C27 would not allow the system to switch to the correct disk after a RAID failure. To correct this a new modutils has been included for the gen III Kernel so that the bandwidth module could correctly load automatically after a reboot. Also included in the update is the fix for the sysctl negative offset bug as well as the ptrace setuid bug. MD5 Check Sum: dad1efe8427613aa4830f85068529647 Reboot Required: Yes
Apache Update 1.0.1
This patch upgrades the version of Apache to 1.3.20. This version of Apache contains various security fixes for issues that were found in prior releases of Apache for the Sun Cobalt Server Appliance. NOTE: Apache 1.3.20 Sun Cobalt Upgrade Overwrites Sun Chili!Soft Apache 1.3.20 Support. If you have upgraded your 3.5.2 version of Sun Chili!Soft ASP to 3.6 AND you installed the Sun Cobalt patch to support Apache 1.3.20, Sun Chili!Soft ASP 3.6 will not work. Contact Sun Chili!Soft Technical Support at chili.tech@sun.com for instructions on how to patch Sun Chili!Soft ASP 3.6 to support Apache 1.3.20. If you have not upgraded to Sun Chili!Soft ASP 3.6 and want support for Apache 1.3.20, install ALL Sun Cobalt 1.0.1 patches FIRST (including the Apache Update 1.0.1), and then install Sun Chili!Soft ASP 3.6. To download a free copy of 3.6 with Sun Chili!Soft SpicePack, go to http://www.chilisoft.com/chiliasp/cobalt.asp MD5 Check Sum: 3b04eebff0e9f12a18415130079b0a72
Reverse Delegation Update 1.0.1
This patch fixes reverse delegations for subnets smaller than a /24. It also adds the ability to have 127.0.0.1 map to the localhost for a domain, and ensures that information relating to Secondary Name Services for networks appears in the web interface properly. MD5 Check Sum: 325b2c69db79ef4c2c36e25c13bb8301
DoS Attack Update 1.0.2
This security update prevents a DoS attack by corrupting htpasswd and passwd when a site administrator adds a new user to the system and the "/tmp" directory or the "/" (root) directory is full.
OS Update 1.0
Prerequisites:
glibc Update 0.0.1
This updates the version of glibc. Prior to this update it was possible for local users to gain root access. Due to the size of this update, please place this package in /home/packages and install via the 'Loaded' option under the 'Install Software' screen.
FrontPage Update 0.0.1-7657
This update fixes three problems that can occur when using Microsoft FrontPage.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|