home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
SGI Freeware 2002 November
/
SGI Freeware 2002 November - Disc 4.iso
/
relnotes
/
shared
/
fw.data
< prev
next >
Wrap
Text File
|
2002-10-07
|
12KB
|
227 lines
<!-- -*- HTML -*- -->
<!-- INCLUDE SIDENAV -->
<!-- NO HIGHLIGHTS -->
<!-- BEGIN TITLE -->
<TITLE>SGI Freeware Information</TITLE>
<META NAME="keywords" CONTENT="SGI IRIX Open Source freeware">
<META NAME="description" CONTENT="Freeware pre-configured, pre-compiled, and inst packaged for SGI IRIX 6.5">
<META NAME="owner" CONTENT="freeware@sgi.com">
<!-- END TITLE -->
<!-- BEGIN CONTENTS -->
<H3><A NAME="contribution">Our Contribution</A></H3>
<P>
We have configured and built these packages so that, to the best of our
knowledge, they run correctly on <I>IRIX 6.5</I>. We also repackaged
these software products so that they can be easily installed using
either <I>inst</I> or <I>SoftwareManager (swmgr)</I>. In essence, this
is merely a redistribution of software that you can download from other
sources and build by yourself. The full, original, source code is
included wherever possible, although it is not installed by default. To
install the full source under <CODE>/usr/freeware/src/</CODE>, click on
<CODE><I>Customize</I></CODE> in <CODE>swmgr</CODE>. The source is
also available <a href="http://freeware.sgi.com/source/">online</a>.
<P>
Unless otherwise noted in the detailed descriptions, the software is
installed into <CODE>/usr/freeware</CODE> to distinguish it from
previous versions you may have installed directly from the authors. In
some cases, system or configuration files in other locations may be
affected, see the detailed descriptions in this distribution for
details.
<P>
We've built these open source packages so that they run on <I>IRIX 6.5</I>
and upwards. Packages are compiled <CODE>n32/mips3</CODE> wherever
possible. In very few cases, compilation is <CODE>o32/mips2</CODE>.
<H3><A NAME="contact">Contacting our volunteers</A></H3>
<P>
If you have any questions, requests, complaints, bugs to report, please
feel free to contact us at
<A HREF="mailto:freeware@sgi.com">freeware@sgi.com</A>.
<P>
If possible, please try to distinguish between SGI specific
problems (e.g. in the packaging or configuration) and problems
in the original source. The latter should be best handled
by reporting them to the original authors or maintainers
of the software.
<H3><A NAME="future">The Future</A></H3>
<P>
For a variety of reasons the authors and/or SGI may decide to
discontinue distributing one or more of these packages.
It is more likely, however,
that we will all try to bring many more packages to you in future
distributions. If there's a package you would like to see as part
of this distribution, please feel free to <A
HREF="mailto:freeware@sgi.com?Subject=Freeware%20package%20request">send
us email</A>.
<P>
As described in the May 2001 "Dear Valued Customer" letter, IRIX 6.2
is in legacy support mode, and will follow the same retirement and
expiration schedule as IRIX 6.3 and IRIX 6.4. SGI's official policy
is that we will not to build any more packages for IRIX 6.2, and that
includes the freeware distribution. Beginning with the August 2001
release all updates and new packages will be built for IRIX 6.5 only.
Unchanged packages will still work on IRIX 6.2 and higher. This was a
tough decision to make knowing how many "hobbyist" users there are out
there. But it was the right decision for the times we are facing now.
<H3><A NAME="using">Changing your Search Path</A></H3>
<P>
By default the search path used by your system will not
include the <CODE>/usr/freeware</CODE> directories.
We have provided a tool called <CODE>fixpath</CODE> which
can be used to modify the files in your local environment controlling
these paths. To use the tool, open a shell window
and type: <CODE>/usr/freeware/bin/fixpath</CODE>.
<H3><A NAME="installs">Downloading/Installing the Packages</A></H3>
<P>
For the <A HREF="http://freeware.sgi.com">freeware.sgi.com</A> web
download and install pages to work, you need to have root access.
Note that the packages are also available for
<A href="ftp://freeware.sgi.com/index.html">download via FTP</A>.
If your downloader doesn't support auto-install like Netscape Navigator
does you have a couple choices:
<ul>
<li>Save the distribution to disk and invoke <CODE>tardist</CODE>
manually on the downloaded file as <CODE>root</CODE>.
<li>Save the distribution to disk, use <CODE>tar</CODE> to unpack the
.tardist files, and run <CODE>swmgr</CODE> as <CODE>root</CODE>.
<li>Download the unpacked inst images from the
<CODE>cd-[1234]/Dist</CODE> directories an invoke <CODE>swmgr</CODE>
as <CODE>root</CODE>.
</ul>
See the <A HREF="selections.html">Freeware Selections Files</A>
web page for more hints.
<H3><A NAME="latest">Latest versions</A></H3>
<P>
The most up-to-date version of SGI Open Source distribution
is on the web at: <A
HREF="http://freeware.sgi.com/">freeware.sgi.com</A>. If you got this
distribution from a CD or elsewhere, there's probably a newer version
available on <A HREF="http://freeware.sgi.com/">freeware.sgi.com</A>.
<P>
Naturally, there's always some package that we're missing, and often we
know of someone that does a good job of maintaining various packages,
so we also have a list of <A HREF="index-alt.html">pointers to
More Freeware</A>. If your favorite package is still not listed, <A
HREF="mailto:freeware@sgi.com">Please send us email</A>!
<H3><A NAME="security">Security Note</A></H3>
<P>
From time to time, people discover security vulnerabilities in open
source software. While SGI cannot be responsible for software we
neither write nor support, when permitted we do distribute the
<a href="http://freeware.sgi.com/source/">full source and patches</a> we
built from for audit, review, and possible correction and improvement.
We generally submit all local patches and enhancements to the package
maintainers, but they are not always accepted into the official
source.
<P>
At the time of this writing we are aware of vulnerabilities in
previously released versions of the software listed below. This should
not be interpreted as a complete list, just what we know about. If
you are aware of any security problems in the current freeware distribution
please <A HREF="mailto:freeware@sgi.com?Subject=Security%20problem">let us
know</A>.
Please see our <A HREF="http://www.sgi.com/support/security/">Security
Headquarters</A> web site for details on IRIX (not freeware) security
issues. The <A href="http://www.sans.org/newlook/digests/">SANS Security
Digests</A> cover a wider range of programs.
<P>
To aid system administrators in keeping up to date with security fixes
a <code>fw_common.sw.security_fixes</code> subsystem has been
created. It contains no files (so you can remove it if you wish), but
it will cause conflicts in the Software Manager if any of packages below
are installed on your system.
<UL>
<LI>analog (versions through 1277895720, May 2002 are vulnerable)
<LI><!-- href="http://www.cert.org/advisories/CA-2002-17.html" -->
<!-- CAN-2002-0839, -0840, -0843 -->
apache (the current version, 1278325120, is vulnerable)
<LI><!-- href="http://www.cert.org/advisories/CA-2000-20.html" -->
bind (versions through 1236162620, February 2001 are vulnerable)
<LI><!-- href="http://www.cert.org/advisories/CA-2002-15.html" -->
bind9 (versions through 1237252320, May 2002 are vulnerable)
<LI><!-- href="http://www.kb.cert.org/vuls/id/579928" -->
diffutils (versions through 1234713120, May 2002 are vulnerable)
<LI><!-- href="http://www.cert.org/vendor_bulletins/VB-95:10a.elm" -->
elm (versions through 1236141820, November 2001 are vulnerable)
<LI>enlightenment (versions through 1236612820, August 2001 are vulnerable)
<LI>enscript (versions through 1234900820, February 2002 are vulnerable)
<LI><!-- href="http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=ethereal" -->
ethereal (the current version, 1278119420, is vulnerable)
<LI>exim (versions through 1235311220, February 2002 are vulnerable)
<LI>exmh (versions through 1235291420, May 2002 are vulnerable)
<LI>expect (the current version, 1235284320, is vulnerable)
<LI>ghostscript (versions through 1236376220, November 2001 are vulnerable)
<LI>gnuplot (versions through 1236805620, November 2001 are vulnerable)
<LI>groff (versions through 1277897820, February 2002 are vulnerable)
<LI>htdig (versions through 1237252520, February 2002 are vulnerable)
<LI>hylafax (versions through 1236330720, May 2002 are vulnerable)
<LI>imap/pop (versions through 1237034120, November 2001 are vulnerable)
<LI>joe (the current version, 1235308920, is vulnerable)
<LI>kdebase (the current version, 1235320620, is vulnerable)
<LI>kdelibs (the current version, 1235310620, is vulnerable)
<LI><!-- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0728" -->
<!-- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0660" -->
libpng (versions through 1277684920, August 2002 are vulnerable)
<LI><!-- href="http://www.cert.org/advisories/CA-2002-07.html" -->
libz (versions through 1235723320, February 2002 are vulnerable)
<LI>licq (versions through 1237252620, February 2002 are vulnerable)
<LI><!-- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0658" -->
mm (the current version, 1278327120, is vulnerable)
<LI>mutt (versions through 1277455920, February 2002 are vulnerable)
<LI>ncurses (versions through 1236163220, February 2002 are vulnerable)
<LI>nedit (the current version, 1237252620, is vulnerable)
<LI>nmh (versions through 1235673420, February 2001 are vulnerable)
<LI>ntop (versions through 1235673420, February 2002 are vulnerable)
<LI><!-- href="http://www.kb.cert.org/vuls/id/970472" -->
ntp (versions through 1235308920, May 2001 are vulnerable)
<LI><a href="http://www.cert.org/advisories/CA-2002-23.html">openssl</a>
(versions through 1278327320, August 2002 are vulnerable)
<LI><!-- href="http://www.cert.org/advisories/CA-2002-18.html" -->
openssh (versions through 1278119020, May 2002 are vulnerable)
<LI>perl (versions through 1236177120, November 2001 are vulnerable)
<LI><a href="http://www.cert.org/advisories/CA-2002-21.html">php</a>
(versions through 1278327420, August 2002 are vulnerable)
<LI>pine (versions through 1235918120, February 2002 are vulnerable)
<LI>proftpd (versions through 1277458520, November 2001 are vulnerable)
<LI>qpopper (discontinued package; please use the fw_imap)
<LI><!-- href="http://www.cert.org/advisories/CA-2002-07.html" -->
rsync (versions through 1236805720, February 2002 are vulnerable)
<LI>samba (versions 200070100, August 2001 are vulnerable)
<LI>screen (versions through 1236112120, August 2000 are vulnerable)
<LI>seyon (no requests for update have been submitted; no fix planned)
<LI>socks5 (versions through 1235493620, November 2001 are vulnerable)
<LI>squid (versions through 1236328820, May 2002 are vulnerable)
<LI>sudo (versions through 1278118720, May 2002 are vulnerable)
<LI><!-- href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-1267" -->
tar (versions through 1278327420, August 2002 are vulnerable)
<LI>tcpdump (versions through 1235493520, February 2002 are vulnerable)
<LI>tcsh (versions through 1237034220, February 2002 are vulnerable)
<LI>tripwire (the current version, 1235493520, is vulnerable)
<LI>vim (versions through 1235090420, May 2001 are vulnerable)
<LI>wu-ftpd (versions through 1237034320, November 2001 are vulnerable)
<LI>xchat (versions through 1277686620, August 2002 are vulnerable)
<LI>xemacs (versions through 1236615220, May 2001 are vulnerable)
</UL>
<P>
This security list was last updated on October 2, 2002.
<H3><A NAME="disclaimer">Disclaimers</A></H3>
<P>
This is free software with open source.
Absolutely no warranties.
<P>
Feedback to <A HREF="mailto:freeware@sgi.com?Subject=Freeware%20comment">freeware@sgi.com</A> is welcome.
<!-- END CONTENTS -->