![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Updates for the Sun Cobalt RaQ4
Downloads MUST be applied from the bottom of the page to the top, as they must be applied in chronlogical order.
Application of these patches in improper order will likely result in problems with the Sun Cobalt product.
NOTICE: This version of updates is now depreciated and should no longer be used. For years people claimed that various programs could not be built on the RaQ4. This line of updates proves that almost anything could be built on the RaQ4. As of today (May 17 2008) I have found very few programs that don't build and are reasonable for installation on the RaQ4 for webhosting. The Plain updates I have created contain most of these updates with a few exceptions. With the addition of SATA drives and IDE drives becoming depreciated and the huge drive sizes available today, I don't feel that the RaQ4 should be used for things like samba anymore. Many of the updates provided by the OS-UPDATE are now included in the Plain updates or on my ftp area. If there is something you would still like to have in the plain updates or the rpm from the OS-UPDATE has dependency problems I suggest you contact me. I will be releasing a final PHP 4.4.8 and MySQl 5 update soon. BIND 9.7.6-P1
This is a Security Update for the DNS Server. It's 6-29-2012 and the Raq4 is Still Current with BIND! Pre-Requisites: Reboot Required: no MD5 Check Sum: 04d00e06ee9a8ec36d5cc9e155b450ce
Apache 1.3.41 mod_ssl 2.8.31-1.3.41 mod_perl 1.30 OpenSSL 0.9.8g
This updates the Apache daemon to 1.3.41 and includes the the ability to use RBL's
Example .htaccess
Pre-Requisites: Reboot Required: yes MD5 Check Sum: cb8801480ba93d5f24543b85f8e95a76
Glibc Timezone Update
This updates the Glibc timezone files to the 2007c version Pre-Requisites: Reboot Required: yes MD5 Check Sum: 713fb69ff91a1c0b2209c07b087fcd2d
Sendmail 8.13.8 Security Upgrade with SSL
This Upgrades Sendmail to 8.13.8 and cyrus sasl to 1.5.24 and INCLUDES SSL SUPPORT!
Pre-Requisites: Reboot Required: yes MD5 Check Sum: 04b0083296310b2a2a110c7b12e23824
Apache 1.3.37 mod_ssl 2.8.28-1.3.37 mod_perl 1.29 OpenSSL 0.9.8d
This Updates the Apache Webserver Program and closes various Security Holes! Pre-Requisites: Reboot Required: yes MD5 Check Sum: e8b44ad0aedc6bde750b8f4601b116d8
Qpopper 4.0.9 Release 2
This Upgrades the Qpopper Program. This is a non-ssl version! Pre-Requisites: Reboot Required: yes MD5 Check Sum: 5eeb5d3e9c6dc00f3a11b841180d0581
Telnet Security Update
This update fixes mulitple security issues with the Telnet program. This is a RE-RELEASE of this update. This Package no longer requires xinetd and now works with the Plain version of the updates. Pre-Requisites: Reboot Required: no MD5 Check Sum: 9de5c1df8055371ea9da90c93d061ff2
BIND 8.4.7
This is a Security Update for the DNS Server. Pre-Requisites: Reboot Required: no MD5 Check Sum: efa97ee4039b9484cf7ddd00644bfab0
Proftpd 1.3.0
The Upgrades the FTP server. Pre-Requisites: Reboot Required: no MD5 Check Sum: 73385f835955049370b52c3dcd296098
IMAP 2004g
This updates the IMAP program and includes SSL and Kerberos Support! Pre-Requisites: Reboot Required: yes MD5 Check Sum: c3c906880753d5ba98de2ec669e3f2ee
OpenLDAP Security Update
This is a OpenLDAP security update Pre-Requisites: Reboot Required: no MD5 Check Sum: b24aec5befcb6c591780c3505badc357
OpenSSH 4.3p2
This installs OpenSSH Pre-Requisites: Reboot Required: no MD5 Check Sum: d07736edf011445a52cfd96920dc2615
OpenSSL 0.9.7a-33.17.Z1 Security Update
This updates OpenSSL on servers with the OS-UPDATE and installs OpenSSL on servers without the OS-UPDATE Pre-Requisites: Reboot Required: no MD5 Check Sum: 2dd3f8b1b818af9622c7fec5665838da
PopRelayD Checkbox Fix 1.0
This Fixes the POP Before SMTP Relaying Checkbox (Control Panel > Email Server Parameters...) so it stays on.
This update is OPTIONAL if your POP Before SMTP Relaying Checkbox is working ok. (It could happen but it probley means
you need to do a lot of updates before this one or you don't use it...) Pre-Requisites: Reboot Required: no MD5 Check Sum: 66021a7962c973815954e12e858966ce
CVS Security Update
This Updates the CVS Software Pre-Requisites: Reboot Required: no MD5 Check Sum: f34aa6d1639afe97eaa4c606097ba605
I strongly suggest using a os restore cd that does not have ssh or any other third party pkgs installed. This update/upgrade is for the base cobalt system and not built around every pkg on the internet... The MySQL password is set to "zeffie-mysql" (without the quotes) RaQ4-OS-UPDATE-1.4.1-Built-by-Zeffie.com
This Update/Upgrade includes...
Click here to see the PHP Info Page
ApacheTop-0.12-1.Z1.Sun.Cobalt.Networks.Zeffie.com.raq4.i386.rpm
and it closes a lot of holes... Pre-Requisites: Reboot Required: yes MD5 Check Sum: f64f8b5fed7589c7f0cabda56255df4b
Standard ISO Version 1 Updates Stop HERE!Bind 8.4.6 Upgrade.
This updates your DNS Server to the current version of bind. Pre-Requisites: Reboot Required: no MD5 Check Sum: 4c4c09dd37855fc767e7bd65fb89696b
Bind 8.4.5 Upgrade.
This upgrades your DNS Server to the current version of bind. This pkg includes an updated version of...
Pre-Requisites: Reboot Required: Yes MD5 Check Sum: 9385ca3b9890fb31158768903194746c
Apache, OpenSSL, and Mod_SSL Upgrade.
This update fixes several security vulnerabilities. This pkg includes an updated...
Pre-Requisites: Reboot Required: Yes MD5 Check Sum: be3e0daaa8ed329f1ad9c8bf43151ed5
NOTICEThe Official Sun Cobalt Updates End Here!Please note that you are using these updates at your own risk and I do not provide free support for them. If you have problems you should try installing the pkgs from the command line and watch for any error messages... These pkg files also represent a basic change in the way updates have been made in the past... While most software was "patched" in the past, it will be my goal to build updated pkgs equivalent to the now Current RedHat Enterprise 3 or best... I will be doing my very best to avoid building "patched" versions of old software however in some places there is no choice.
Mutt Security Update 2.0.1
This update fixes security vulnerabilities with mutt. Pre-Requisites: Reboot Required: No MD5 Check Sum: 4a1b391bc789cd469fbcb20f1fe2eb55
ProFTPD Security Update 2.0.1
This update addresses a buffer overflow vulnerability with ProFTPD. Pre-Requisites: Reboot Required: No MD5 Check Sum: d47fcf99b19603d5096a18e63d3f5c72
Pine Security Update 2.0.1
This patch fixes security vulnerabilities in Pine. Pre-Requisites: Reboot Required: No MD5 Check Sum: 5173af407a7acffbd47d300d48279266
Fileutils Security Update 2.0.1
This updates address a remote denial of services vulnerability in the ls program, a utility that is part of the fileutils package. Pre-Requisites: Reboot Required: No MD5 Check Sum: 0160b0e292073272a0062e3ed64c8e1d
Rsync Security Update 2.0.1
This update addresses a heap overflow vulnerability in rsync, is a program for sychronizing files over the network. Pre-Requisites: Reboot Required: No MD5 Check Sum: 982e0aee16bfef2c7bf6941fd82a2134
BIND Security Update 2.0.1
This update addresses a vulnerability in BIND, that could allow an attacker to conduct cache poisoning attacks on the name servers by convincing the servers to retain invalid negative responses. For more information, see: CAN-2003-0914 Pre-Requisites: Reboot Required: No MD5 Check Sum: 3ccc453abf220577299a29602147e8aa
Slocate Security Update 2.0.1
This update addresses a vulnerability in slocate where the heap management structures could be corrupted possibly lead to an
attacker gaining slocate group
privileges.
Reboot Required: No MD5 Check Sum: 7da97b57a3e721a506f95159337dc18e
Tcpdump Security Update 2.0.1
This update adresses a vulnerability in tcpdump, where the privileges were not dropped corrextly at startup time. for more information, see: CAN-2003-0194 Pre-Requisites: Reboot Required: No MD5 Check Sum: 68c07c7d46673e2505ce769192557061
Bash Security Update 2.0.1
This update addresses a vulnerability in the bash shell. Temporary files were created with insecure permissions, which could
allow an attacker to launch a symlink attack to overwrite arbitrary files.
Reboot Required: No MD5 Check Sum: 637eeb5554fd973769ca9c2904a24b8a
Sendmail Security Update 2.0.2
This update addresses two vulnerabilities in Sendmail.
Version 2.0.1 ofthe patch did not preserve the configuration file correctly. This updated version (2.0.2) addresses this problem. Pre-Requisites: Reboot Required: No MD5 Check Sum: bbe4af96f826c3476286fdd48ae3497f
NFS-Utils Security Update 2.0.1
This update addresses a buffer overflow in nfs-utils that could be exploited by an attacker, causing a remote Denial of
Service.
Reboot Required: No MD5 Check Sum: 3afb09c7032e5fcd94e5ee291c328d43
Imap Clients Security Update 2.0.1
This update addresses multiple buffer overflow vulnerabilities discovered in various IMAP clients (Pine, Mutt, Imap). Pre-Requisites: Reboot Required: No MD5 Check Sum: 8e61a1e9a313f87d269ceae03f33104d
BIND Security Update 2.0.1
This update addresses multiple vulnerabilities discovered in the Berkeley Internet Name Domain Server (BIND).
Reboot Required: No MD5 Check Sum: c26bbca1ac66a5b759b65afc4c783c31
Unzip Security Update 2.0.1
Updated unzip packages resolve a vulnerability allowing arbitrary files to be overwritten. The original patch to fix this issue (16170) missed a case where the path component included a quoted slash. These updated packages contain a new patch that corrects this issue. for more information, see: CAN-2003-0282 Reboot Required: No MD5 Check Sum: 0768c2e8ebbbc2997026eac6cf15d989
Zlib Security Update 2.0.2
This update addresses a buffer overflow vulnerability in the gzprintf function of the zlib compression package. For more information, see CAN-2003-0107 Version 2 corrects dependency on update 13323 Pre-Requisites: Reboot Required: No MD5 Check Sum: 0d06c35dd17e60482ac87297bbdc2ef9
Maximum Disk Space Update 2.0.1
This update addresses a problem when setting the maximum disk space for a virtual site to a value divisible by 10. Reboot Required: No MD5 Check Sum: 1cf0bfa6f15770a69b63ecf9a387eb6a
Kernel Update C37 2.0.1
This updated kernel fixes a vulnerability in ptrace that could allow local users to obtain full privileges. Remote exploitation of this hole is not possible. For more information see: CAN-2003-0127 This kernel also fixes a problem with the I2C driver where the locks were not IRQ safe. This could cause problems including the system reporting false fan failures, repeated raid syncs, and random reboots. Reboot Required: Yes MD5 Check Sum: a5b1f97c372cb5b517558e141792e3d9
Vim Security Update 2.0.1
This update addresses a vulnerability found in the Vim editor, that could allow attackers to execute arbitrary commands using the libcall feature in modelines. For more information, see CAN-2002-1377 Reboot Required: No MD5 Check Sum: 8b0f0b92200cff373028a338dca568e8
Apache & SSL Security 2.0.1
This update addresses multiple vulnerabilities found in Apache and OpenSSL.
Reboot Required: Yes MD5 Check Sum: 187867bd991cfdd0eab0b8c0e913b0e0
Qpopper Security Update 2.0.1
This update addresses a buffer overflow vulnerability found in Qpopper. Reboot Required: No MD5 Check Sum: 46730b7b3beb48f2ece82730142fd486
Wget Security Update 2.0.1
This update addresses a directory traversal vulnerability in wget. Reboot Required: No MD5 Check Sum: a010a4c05392cc1486ca0f2d7dfa4125
Pine & File Security Update 2.0.1
This update addresses vulnerabilities found in the pine mail program and the file program. Pine was vulnerable to a remote denial of service. For more information, see http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 File was vulnerable to a local buffer overflow. For more information, see http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0102 Reboot Required: No MD5 Check Sum: 2e13e4520140d9bd3ef7e0a1e1d1f9c0
Glibc Security Update 2.0.1
This update addresses a security vulnerability in the glibc resolver. For more information, see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1146 Reboot Required: Yes MD5 Check Sum: cbcbb45e653b62c9005e7de2347c2173
Sendmail Security Update 2.0.1
This patch updates the Sendmail program on your server to address a buffer overflow vulnerability. See http://www.cert.org/advisories/CA-2003-12.html for more information. Pre-Requisites: Reboot Required: No MD5 Check Sum: 911dd676681b050a6c17e5733c79fb45
Kernel Update 2.0.1 C35
This patch will update your kernel to version 2.2.16-C35. This kernel addresses a RAID issue on the RaQ4 where synchronization of a RAID array could take a long time. Reboot Required: Yes MD5 Check Sum: e778ebe202cca27540d2cf28cb3ca1c8
Sendmail Security Update 2.0.1
This patch updates the Sendmail program on your server to address a remote buffer overflow vulnerability. See http://www.cert.org/advisories/CA-2003-07.html for more information. Reboot Required: No MD5 Check Sum: 8d01bb169854393f6547d2718f8f7f56
PHP & PostgreSQL Security Update 2.0.1
This package addresses several issues with PHP and postgresql. Two PHP bugs have been fixed; the first is arbitrary command execution via the 5th parameter of mail() and the second is URL redirection using fopen(). In Postgresql, multiple buffer overruns have been recently identified and patched. In addition, Postgresql debugging is now disabled by default. Reboot Required: Yes MD5 Check Sum: f4798e1d90d332e23855dd5161ad5496
Root DNS server update 2.0.1
The IP address of one of the root DNS servers (J.ROOT-SERVERS.NET) has been changed. This patch updates the list of root DNS servers on your appliance. Reboot Required: No MD5 Check Sum: f4216e305ee5341a6e6d043667c024a1
Tar & Unzip Security update 2.0.1
The unzip and tar utilities contain vulnerabilities which can allow arbitrary files to be overwritten during archive extraction. See http://www.securityfocus.com/archive/1/196445 for more information. Reboot Required: No MD5 Check Sum: b00b98f358c6bfdd239a188938e930d9
Cgiwrap Update 2.0.1
This package addresses a cross-site scripting vulnerablity with cgiwrap when used with browsers that ignore input before the HTML and BODY tags. Reboot Required: No MD5 Check Sum: 04c0e33304a3225498ac7667ff8b4a55
Proftpd Security Update 2.0.1
This patch fixes an upload file permission issue in proftpd. It also adds an extra security measure by preventing some default system accounts from logging in via ftp Reboot Required: No MD5 Check Sum: 72542c19fca67a688f88ef9f017ffbd0
Util-linux Update 2.0.1
The chfn binary from the util-linux package could be used to gain unauthorized access. Reboot Required: No MD5 Check Sum: 901504d66b3a9d5500dea101765bebce
Kernel Update 2.0.1 C33
Kernel C33 fixes the "do_try_to_free_pages failed" VM problem under heavy load and also adds support for raw I/O. Reboot Required: Yes MD5 Check Sum: 0ea53b2ef29a724c16111c32b167ef17
SHP Removal 2.0.1
This patch removes the SHP package. Customers who installed SHP are advised to
install this patch to remove a serious vulnerability issue. For more
information please see: Reboot Required: Yes MD5 Check Sum: ca100017bc957075ba6b142f337ef0a4
IMAP Update 2.0.2
This patch fixes a Remote Buffer Overflow in imapd. Reboot Required: No MD5 Check Sum: 7e28442e0a713afd91fbe5dadad920ab
Apache & SSL Update 2.0.1
This patch fixes multiple security issues with the Apache HTTP Server and OpenSSL. For more information please see: Reboot Required: Yes MD5 Check Sum: 38264ad4dfcf3f16101385a6ad139178
CGIWrap Update 2.0.1
This package contains an updated CGIWrap that addresses a security issue recently discovered. For more information, please see: http://online.securityfocus.com/bid/3084 Reboot Required: No MD5 Check Sum: 579057707156df964a2e3dbf9f1f18d3
Apache Update 2.0.1
This package contains an updated Apache HTTP Server that addresses a security issue recently discovered. For more information, please see http://httpd.apache.org/info/security_bulletin_20020617.txt MD5 Check Sum: d4055016dca256af3070c866cde2bcae Reboot Required: Yes
TCPDUMP Update 2.0.1
This patch replaces the TCPDUMP network analysis tool with a new version. This version of TCPDUMP contains security fixes for issues that were found in prior releases of TCPDUMP for the Sun Cobalt Server Appliance. MD5 Check Sum: ed01348f71d8ebdaac8065d444a41269 Reboot Required: No
PHP Service Settings Update 2.0.1
This patch fixes a sync issue between what is shown in the web UI and what the actual state is on the server for the PHP service. MD5 Check Sum: 9968454952f9e0dc773a624016df2948 Reboot Required: Yes
Security Bundle Update 2.0.1
This package upgrades the following for a varity of security concerns:
MD5 Check Sum: 08285df27e1420ad8193c689ded57b89 Reboot Required: No
Duplicate Email Alias Update 2.0.1
This patch filters email alias entries preventing duplicate virtusertable entries on your server appliance. MD5 Check Sum: 13151e1c05deb07648056b7f0f1f87c3 Reboot Required: No
PHP Update Update 2.0.1
This patch upgrades the version of the PHP scripting engine on your server appliance. This version of PHP contains security fixes for issues that were found in prior releases of PHP for the Sun Cobalt server appliance. This Update installs PHP version 4.0.6-C4. If you have upgraded PHP through a means other then packages from this website, your changes will be overwritten. MD5 Check Sum: e640b63ed855068d7df58c17d82885a2 Reboot Required: No
glibc Update 2.0.1
This updates the version of glibc to fix a known vulnerability with file globbing functionality. See the following link for details: http://online.securityfocus.com/bid/3707 MD5 Check Sum: af333d0ca687404569c996f2746a4cc1 Reboot Required: Yes
Kernel Update 2.0.1
Updates Kernel version to C32 to fix following security alert. http://www.securityfocus.com/advisories/3607 NOTE: This package is for Sun Cobalt RaQ 4 Non-StaQware systems only. If you have Sun Cobalt StaQware running, please install kernel update at http://www.cobalt.com/support/download/staqwareraq4.html MD5 Check Sum: 7cf79a0da0c91a0de98db51977deb430 Reboot Required: Yes
DNS Update 2.0.1
This package fixes a number of issues within Sun Cobalt's DNS configuration and management interface and it's interactions with the nameserver. Moreover, after this patch, the administrator will have more options in specifying the method of RFC 2317 style reverse subnet delegation. MD5 Check Sum: b489ef028b80ceeb30bf5db2348923f9 Reboot Required: No
OS Update 2.0
This patch is an update to the Sun Cobalt RaQ 4 server appliance. It incorporates all previous patches as well as various bug fixes. See the following PDF for a complete list of bugs addressed in this update. Prerequisites:
RaQ4-en-OSUpdate-Installation.pdf MD5 Check Sum: bd95b7cf9302cb9b7c335f99863889eb Reboot Required: Yes
Kernel Update 1.0.1
Kernel C24 and C27 would not allow the system to switch to the correct disk after a RAID failure. To correct this a new modutils has been included for the gen III Kernel so that the bandwidth module could correctly load automatically after a reboot. Also included in the update is the fix for the sysctl negative offset bug as well as the ptrace setuid bug. MD5 Check Sum: dad1efe8427613aa4830f85068529647 Reboot Required: Yes
Apache Update 1.0.1
This patch upgrades the version of Apache to 1.3.20. This version of Apache contains various security fixes for issues that were found in prior releases of Apache for the Sun Cobalt Server Appliance. NOTE: Apache 1.3.20 Sun Cobalt Upgrade Overwrites Sun Chili!Soft Apache 1.3.20 Support. If you have upgraded your 3.5.2 version of Sun Chili!Soft ASP to 3.6 AND you installed the Sun Cobalt patch to support Apache 1.3.20, Sun Chili!Soft ASP 3.6 will not work. Contact Sun Chili!Soft Technical Support at chili.tech@sun.com for instructions on how to patch Sun Chili!Soft ASP 3.6 to support Apache 1.3.20. If you have not upgraded to Sun Chili!Soft ASP 3.6 and want support for Apache 1.3.20, install ALL Sun Cobalt 1.0.1 patches FIRST (including the Apache Update 1.0.1), and then install Sun Chili!Soft ASP 3.6. To download a free copy of 3.6 with Sun Chili!Soft SpicePack, go to http://www.chilisoft.com/chiliasp/cobalt.asp MD5 Check Sum: 3b04eebff0e9f12a18415130079b0a72
Reverse Delegation Update 1.0.1
This patch fixes reverse delegations for subnets smaller than a /24. It also adds the ability to have 127.0.0.1 map to the localhost for a domain, and ensures that information relating to Secondary Name Services for networks appears in the web interface properly. MD5 Check Sum: 325b2c69db79ef4c2c36e25c13bb8301
DoS Attack Update 1.0.2
This security update prevents a DoS attack by corrupting htpasswd and passwd when a site administrator adds a new user to the system and the "/tmp" directory or the "/" (root) directory is full.
OS Update 1.0
Prerequisites:
glibc Update 0.0.1
This updates the version of glibc. Prior to this update it was possible for local users to gain root access. Due to the size of this update, please place this package in /home/packages and install via the 'Loaded' option under the 'Install Software' screen.
FrontPage Update 0.0.1-7657
This update fixes three problems that can occur when using Microsoft FrontPage.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|