[RHSA-2002:028-13] Updated 2.4 kernel available

From: bugzillaat_private
Date: Wed Feb 27 2002 - 11:59:23 PST

  • Next message: Elie aka \: "Using Environment for returning into Lib C"

    ---------------------------------------------------------------------
                       Red Hat, Inc. Red Hat Security Advisory
    
    Synopsis:          Updated 2.4 kernel available
    Advisory ID:       RHSA-2002:028-13
    Issue date:        2002-02-13
    Updated on:        2002-02-27
    Product:           Red Hat Linux
    Keywords:          irc connection tracking netfilter lcall
    Cross references:  
    Obsoletes:         RHSA-2002:007
    ---------------------------------------------------------------------
    
    1. Topic:
    
    The Linux Netfilter team has found a problem in the "IRC connection
    tracking" component of the firewall within the linux kernel. This problem
    affects Red Hat Linux versions 7.1 and 7.2.
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64
    
    Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64, s390
    
    3. Problem description:
    
    The Linux Netfilter team has found a problem in the IRC connection
    tracking component of the firewall within the linux kernel. This component
    is distributed with kernels in Red Hat Linux 7.1 and 7.2, although it is
    not used in default installations.
    
    The problem consists of an excessively broad netmask setting which is
    applied to check if an "IRC DCC" connection through a masquerading firewall
    should be allowed. This results in unwanted ports being opened on the
    firewall, which could, depending on the firewall filter ruleset, allow
    inbound connections.
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2002-0060 to this issue.  Thanks to Jozsef Kadlecsik
    and Harald Welte of the netfilter team.
    
    Users are advised to upgrade to this errata kernel containing patches
    which fix these issues.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied. Red Hat Linux 7.1 users should
    update the packages in the XFree86 Erratum (RHEA-2002:010).
    
    The procedure for upgrading the kernel is documented at:
    
    http://www.redhat.com/support/docs/howto/kernel-upgrade/
    
    Please read the directions for your architecture carefully before
    proceeding with the kernel upgrade.
    
    Please note that this update is also available via Red Hat Network.  Many
    people find this to be an easier way to apply updates.  To use Red Hat
    Network, launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system. Note that you need to select the kernel
    explicitly on default configurations of up2date.
    
    Note for customers using Red Hat Linux for the IBM s/390:
    
    Users of Red Hat Linux for the IBM s/390 with binary only kernel modules
    (OCO) should contact their vendor to obtain updated modules for this kernel
    patch.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    
    
    6. RPMs required:
    
    Red Hat Linux 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
    
    alpha:
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
    ftp://updates.redhat.com/7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
    
    athlon:
    ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
    ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
    
    i586:
    ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
    ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
    
    i686:
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
    
    ia64:
    ftp://updates.redhat.com/7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
    
    Red Hat Linux 7.2:
    
    SRPMS:
    ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
    
    athlon:
    ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
    ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
    
    i386:
    ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
    ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
    
    i586:
    ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
    ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
    
    i686:
    ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
    ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
    
    ia64:
    ftp://updates.redhat.com/7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
    ftp://updates.redhat.com/7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
    
    s390:
    ftp://updates.redhat.com/7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
    ftp://updates.redhat.com/7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
    ftp://updates.redhat.com/7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
    ftp://updates.redhat.com/7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
    ftp://updates.redhat.com/7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
    
    
    
    7. Verification:
    
    MD5 sum                          Package Name
    --------------------------------------------------------------------------
    599a9027496067a54b46716c4af2184a 7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
    4bccc363fdf0f00805ef4c34bbf8b43d 7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
    92f4dd670944fd607181089b04a1dcd9 7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
    5cb53f48285237d8027b17604ab39616 7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
    9f95ed2c259c6eeb2cbc13a8e21a447c 7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
    d43622963a55e817233a258d8318a120 7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
    9d43960cc26be1783d8004addbb2bb9b 7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
    8b0c9d11ee3f66790b4dca48f018e10b 7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
    8e710a5f2a98932c2bc9e0d3d073e244 7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
    64705698f9f5eaf1e79185863382f941 7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
    b239ceebf5b5c28a348cd960d3195f03 7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
    6883d71ffe17dff75514ac38228cd5f0 7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
    dae89931407ae5832e374e49d8347234 7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
    cba833ad4e2b45392e4de085ca0e920f 7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
    8e50430f6c4f452d2625819ba7464c47 7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
    e72f4fd75463bba1d51b7c7df1999704 7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
    5e2b0b72141cbba077eb9c6b4d99991c 7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
    a744dabe626acd95740aeb9af88b6d5b 7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
    aea058a30a30b3708b988c326ada6d0a 7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
    3af0f1894a0c8b80486146298144727a 7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
    322164648ff900315ea8d062f43de2e8 7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
    3f7c2c541be3797083cc7ac32e0fdebd 7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
    c8681048d6817a289ca59e0b4c38e611 7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
    19026b6d0ce77ce6ced75aa5de77b49a 7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
    2bdf102fd5b9e7b7e04c6e14d258eeae 7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
    599a9027496067a54b46716c4af2184a 7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
    8b0c9d11ee3f66790b4dca48f018e10b 7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
    8e710a5f2a98932c2bc9e0d3d073e244 7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
    64705698f9f5eaf1e79185863382f941 7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
    b239ceebf5b5c28a348cd960d3195f03 7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
    6883d71ffe17dff75514ac38228cd5f0 7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
    dae89931407ae5832e374e49d8347234 7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
    cba833ad4e2b45392e4de085ca0e920f 7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
    8e50430f6c4f452d2625819ba7464c47 7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
    e72f4fd75463bba1d51b7c7df1999704 7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
    5e2b0b72141cbba077eb9c6b4d99991c 7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
    a744dabe626acd95740aeb9af88b6d5b 7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
    aea058a30a30b3708b988c326ada6d0a 7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
    3af0f1894a0c8b80486146298144727a 7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
    322164648ff900315ea8d062f43de2e8 7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
    3f7c2c541be3797083cc7ac32e0fdebd 7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
    c8681048d6817a289ca59e0b4c38e611 7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
    19026b6d0ce77ce6ced75aa5de77b49a 7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
    2bdf102fd5b9e7b7e04c6e14d258eeae 7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
    03414b5deff2f6f673342ea3b8d5cf63 7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
    29db2044bac2e46027afa7479f39a394 7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
    b24851e70837659048e8416e0552fb0f 7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
    b5ad515e3bffc79fdbc73a3e0b07b5cc 7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
    27d48439af20ab9f9b6ad84942913fe7 7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
     
    
    These packages are GPG signed by Red Hat, Inc. for security.  Our key
    is available at:
        http://www.redhat.com/about/contact/pgpkey.html
    
    You can verify each package with the following command:
        rpm --checksig  <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        rpm --checksig --nogpg <filename>
    
    8. References:
    
    http://www.netfilter.org/security/irc-dcc-mask.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0060
    
    
    Copyright(c) 2000, 2001 Red Hat, Inc.
    



    This archive was generated by hypermail 2b30 : Wed Feb 27 2002 - 19:33:23 PST