[RHSA-2001:084-03] Kernel: FTP iptables vulnerability in 2.4 kernel and general bug fixes

From: bugzillaat_private
Date: Fri Jun 22 2001 - 11:30:09 PDT

  • Next message: Support Info: "Security Update: [CSSA-2001-022.0] buffer overflow in fetchmail"

    ---------------------------------------------------------------------
                       Red Hat, Inc. Red Hat Security Advisory
    
    Synopsis:          Kernel: FTP iptables vulnerability in 2.4 kernel and general bug fixes
    Advisory ID:       RHSA-2001:084-03
    Issue date:        2001-06-21
    Updated on:        2001-06-21
    Product:           Red Hat Linux
    Keywords:          iptables FTP ip_conntrack_ftp kernel
    Cross references:  
    Obsoletes:         RHSA-2001:052-02
    ---------------------------------------------------------------------
    
    1. Topic:
    
    A security hole has been found that does not affect the default
    configuration of Red Hat Linux, but it can affect some custom
    configurations of Red Hat Linux 7.1. The bug is specific
    to the Linux 2.4 kernel series. Aside from the fix, countless bugfixes
    have been applied to this kernel as a result of code-audits by the
    MC project of the Stanford University and others.
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 7.1 - i386, i586, i686
    
    3. Problem description:
    
    A vulnerability in iptables "RELATED" connection tracking has been
    discovered. When using iptables to allow FTP "RELATED" connections
    through the firewall, carefully constructed PORT commands can open
    arbitrary holes in the firewall.
    
    Default installations of Red Hat Linux 7.1 are not vulnerable; however
    upgrading to this kernel is recommended regardless in order to benefit from
    the other bug fixes in this kernel.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    The procedure for upgrading the kernel is documented at:
    
    
    http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html
    
    Please read the directions for your architecture carefully before
    proceeding with the kernel upgrade.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this an easier way to apply updates.  To use Red Hat Network,
    launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    26999 - drm:r128_do_wait_for_fifo
    29140 - Garbage output reported in kernel startup scanning DMA zones
    29573 - erroneous IRQ conflict message
    29555 - [aic7xxx] Installer hangs loading the aic7xxx module
    29730 - Installer hangs when mounting IDE CDROM
    31769 - Kernel fails to load cs46xx module on an IBM Thinkpad T20
    32723 - No Bass on Sound Blaster Live (emu10k1 chip)  on 2.4.x kernel
    36897 - missing entry in listing of an NFS directory served by IRIX
    38429 - Ext2 file corruption with RH71 2.4.2-2 kernel and ServerWorks chipset
    38536 - ide=reverse option not in install kernel
    38588 - Installer hangs during package upgrades from 6.2
    39445 - pcnet32: warning: PROM address does not match CSR addre
    39468 - Integration of TUX broke higher number system calls
    39845 - mtrr not working properly (kernel 2.4.2-2)
    40123 - Rebuild of custom kernel fails with 'undefined reference'
    40793 - PCMCIA services fail to recognize inserts and removals on Dell Latitude CPx with more than 256Mb RAM
    41353 - Poweroff crashes just before it should power down
    41856 - mtrr (write-combining) messages on Athlon 1300
    43659 - Installer hangs when sym58c8xx driver loading for Tekram DC-390U3W
    43940 - wvlan_cs update to 1.07 in 2.4.3-track
    
    6. RPMs required:
    
    Red Hat Linux 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.3-12.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm
    
    i586:
    ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.3-12.i586.rpm
    ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm
    
    i686:
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.3-12.i686.rpm
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm
    
    
    
    7. Verification:
    
    MD5 sum                           Package Name
    --------------------------------------------------------------------------
    4fc88b39d9a4c133383e26e169ea0028 7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm
    56441741db1afc54585c09d5d70958d2 7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm
    dc7d6ca72aa0a81cd9070ac41c00c084 7.1/en/os/i386/kernel-2.4.3-12.i386.rpm
    33eaefca0670a7908d2dd27bae24937a 7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm
    d6494b754931b3f8cad2a9db985e9183 7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm
    6409be31e631616ad1382dd8abe49009 7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm
    047d31db622884f59036b2de6c02f72a 7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm
    f2c2424f9ab4e04ae10ca81ef971edca 7.1/en/os/i586/kernel-2.4.3-12.i586.rpm
    dc5b453ba1f85cbe7747c016fe957c5c 7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm
    6e4dfbf5e9381a7c37113f61d77276df 7.1/en/os/i686/kernel-2.4.3-12.i686.rpm
    0ef5481dd241cdae1df75b7f4cd3a213 7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm
    5588b32b37b96493ce4d37eaaa1e2f3f 7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at:
        http://www.redhat.com/corp/contact.html
    
    You can verify each package with the following command:
        rpm --checksig  <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        rpm --checksig --nogpg <filename>
    
    8. References:
    
    http://www.redhat.com/support/errata/RHSA-2001-052.html
    http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html
    
    
    Copyright(c) 2000, 2001 Red Hat, Inc.
    



    This archive was generated by hypermail 2b30 : Fri Jun 22 2001 - 18:46:09 PDT