Debian: iptables modprobe failure fix

    Date01 Nov 2004
    CategoryDebian
    3248
    Posted ByLinuxSecurity Advisories
    Faheem Mitha noticed that the iptables command, an administration tool for IPv4 packet filtering and NAT, did not always load the required modules on it own as it was supposed to.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 580-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    November 1st, 2004                       http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : iptables
    Vulnerability  : missing initialisation
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2004-0986
    Debian Bug     : 219686
    
    Faheem Mitha noticed that the iptables command, an administration tool
    for IPv4 packet filtering and NAT, did not always load the required
    modules on it own as it was supposed to.  This could lead to firewall
    rules not being loaded on system startup.  This caused a failure in
    connection with rules provided by lokkit at least.
    
    For the stable distribution (woody) this problem has been fixed in
    version 1.2.6a-5.0woody2.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 1.2.11-4.
    
    We recommend that you upgrade your iptables package.
    
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2.dsc
          Size/MD5 checksum:      639 03ce7ecd0cc462b0b0bef08d400f5a39
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2.diff.gz
          Size/MD5 checksum:    82136 6c6305ebf8da551d7cbdfc4fe1149d87
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a.orig.tar.gz
          Size/MD5 checksum:   422313 84aed37b27830c1a74ece6765db0c31c
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_alpha.deb
          Size/MD5 checksum:   377404 4adc7c8e3b71d6732fe36a223d044fc7
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_alpha.deb
          Size/MD5 checksum:   110230 c0e0ecb43614186556adcd714e4d1272
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_arm.deb
          Size/MD5 checksum:   314110 8d0b4d2e6d7af1377cccf91898a7bda6
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_arm.deb
          Size/MD5 checksum:    99130 aff30c9fc49fed3c4b21f418b43c4e65
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_i386.deb
          Size/MD5 checksum:   287114 b0ff0f6ab787a136d7ef6f8819b04f96
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_i386.deb
          Size/MD5 checksum:    96442 1c2d7ec853da4fdca2ca4e5bddd6740f
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_ia64.deb
          Size/MD5 checksum:   446814 e9ea93b92e97a66164411be155b93598
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_ia64.deb
          Size/MD5 checksum:   116386 42deb79a474dd9d78bddfe723b4ee6c4
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_hppa.deb
          Size/MD5 checksum:   345212 4866e88ca61f8ac2778cc3ce44d142ac
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_hppa.deb
          Size/MD5 checksum:    95430 c60ef8c05e0c238d8ac7682626f3972d
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_m68k.deb
          Size/MD5 checksum:   289032 f7748d7e5cc9726b7142d918712abd6d
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_m68k.deb
          Size/MD5 checksum:    91232 37e6e304f0b4ebf666c4ffc860253a73
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_mips.deb
          Size/MD5 checksum:   326050 713a2efd308c98a3a48135664c7a385c
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_mips.deb
          Size/MD5 checksum:   106754 f44458bc89644ddb91a63caa498456ad
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_mipsel.deb
          Size/MD5 checksum:   327082 731e9de4f81d6ecc114c89b2c54e99c7
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_mipsel.deb
          Size/MD5 checksum:   106898 25d89525b8d158f12eaaf2db6635fd14
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_powerpc.deb
          Size/MD5 checksum:   321422 a73bf7a5f4696a44abe4dc19d9508cc8
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_powerpc.deb
          Size/MD5 checksum:   101350 e81ceac78d6a38cfdd6b8f09e0cb176e
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_s390.deb
          Size/MD5 checksum:   307826 1092ceb008461ac0323b2ddfc2327c22
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_s390.deb
          Size/MD5 checksum:    97020 c5079802be1fed9934527371cf6a99d8
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_sparc.deb
          Size/MD5 checksum:   323322 b33b11c7b474c50a84087f99580c122c
         http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_sparc.deb
          Size/MD5 checksum:    98876 dc0ed1d555df1abb1868514fa307a88c
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.