Discover Government News

`

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Kernel: FTP iptables vulnerability in 2.4 kernel and general bug fixes
Advisory ID:       RHSA-2001:084-03
Issue date:        2001-06-21
Updated on:        2001-06-21
Product:           Red Hat Linux
Keywords:          iptables FTP ip_conntrack_ftp kernel
Cross references:  
Obsoletes:         RHSA-2001:052-02
---------------------------------------------------------------------

1. Topic:

A security hole has been found that does not affect the default
configuration of Red Hat Linux, but it can affect some custom
configurations of Red Hat Linux 7.1. The bug is specific
to the Linux 2.4 kernel series. Aside from the fix, countless bugfixes
have been applied to this kernel as a result of code-audits by the
MC project of the Stanford University and others.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - i386, i586, i686

3. Problem description:

A vulnerability in iptables "RELATED" connection tracking has been
discovered. When using iptables to allow FTP "RELATED" connections
through the firewall, carefully constructed PORT commands can open
arbitrary holes in the firewall.

Default installations of Red Hat Linux 7.1 are not vulnerable; however
upgrading to this kernel is recommended regardless in order to benefit from
the other bug fixes in this kernel.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel is documented at:

 
Support

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed  (  for more info):

26999 - drm:r128_do_wait_for_fifo
29140 - Garbage output reported in kernel startup scanning DMA zones
29573 - erroneous IRQ conflict message
29555 - [aic7xxx] Installer hangs loading the aic7xxx module
29730 - Installer hangs when mounting IDE CDROM
31769 - Kernel fails to load cs46xx module on an IBM Thinkpad T20
32723 - No Bass on Sound Blaster Live (emu10k1 chip)  on 2.4.x kernel
36897 - missing entry in listing of an NFS directory served by IRIX
38429 - Ext2 file corruption with RH71 2.4.2-2 kernel and ServerWorks chipset
38536 - ide=reverse option not in install kernel
38588 - Installer hangs during package upgrades from 6.2
39445 - pcnet32: warning: PROM address does not match CSR addre
39468 - Integration of TUX broke higher number system calls
39845 - mtrr not working properly (kernel 2.4.2-2)
40123 - Rebuild of custom kernel fails with 'undefined reference'
40793 - PCMCIA services fail to recognize inserts and removals on Dell Latitude CPx with more than 256Mb RAM
41353 - Poweroff crashes just before it should power down
41856 - mtrr (write-combining) messages on Athlon 1300
43659 - Installer hangs when sym58c8xx driver loading for Tekram DC-390U3W
43940 - wvlan_cs update to 1.07 in 2.4.3-track

6. RPMs required:

Red Hat Linux 7.1:

SRPMS: 
 

i386: 
  
  
  
  
  
 

i586: 
  
 

i686: 
  
  
 



7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
4fc88b39d9a4c133383e26e169ea0028 7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm
56441741db1afc54585c09d5d70958d2 7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm
dc7d6ca72aa0a81cd9070ac41c00c084 7.1/en/os/i386/kernel-2.4.3-12.i386.rpm
33eaefca0670a7908d2dd27bae24937a 7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm
d6494b754931b3f8cad2a9db985e9183 7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm
6409be31e631616ad1382dd8abe49009 7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm
047d31db622884f59036b2de6c02f72a 7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm
f2c2424f9ab4e04ae10ca81ef971edca 7.1/en/os/i586/kernel-2.4.3-12.i586.rpm
dc5b453ba1f85cbe7747c016fe957c5c 7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm
6e4dfbf5e9381a7c37113f61d77276df 7.1/en/os/i686/kernel-2.4.3-12.i686.rpm
0ef5481dd241cdae1df75b7f4cd3a213 7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm
5588b32b37b96493ce4d37eaaa1e2f3f 7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
      

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
Support 
Support


Copyright(c) 2000, 2001 Red Hat, Inc.

`

RedHat: FTP iptables kernel vulnerability

A vulnerability in iptables "RELATED" connection tracking has beendiscovered

Summary



Summary

A vulnerability in iptables "RELATED" connection tracking has beendiscovered. When using iptables to allow FTP "RELATED" connectionsthrough the firewall, carefully constructed PORT commands can openarbitrary holes in the firewall.Default installations of Red Hat Linux 7.1 are not vulnerable; howeverupgrading to this kernel is recommended regardless in order to benefit fromthe other bug fixes in this kernel.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
The procedure for upgrading the kernel is documented at:

Support
Please read the directions for your architecture carefully before proceeding with the kernel upgrade.
Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed ( for more info):
26999 - drm:r128_do_wait_for_fifo 29140 - Garbage output reported in kernel startup scanning DMA zones 29573 - erroneous IRQ conflict message 29555 - [aic7xxx] Installer hangs loading the aic7xxx module 29730 - Installer hangs when mounting IDE CDROM 31769 - Kernel fails to load cs46xx module on an IBM Thinkpad T20 32723 - No Bass on Sound Blaster Live (emu10k1 chip) on 2.4.x kernel 36897 - missing entry in listing of an NFS directory served by IRIX 38429 - Ext2 file corruption with RH71 2.4.2-2 kernel and ServerWorks chipset 38536 - ide=reverse option not in install kernel 38588 - Installer hangs during package upgrades from 6.2 39445 - pcnet32: warning: PROM address does not match CSR addre 39468 - Integration of TUX broke higher number system calls 39845 - mtrr not working properly (kernel 2.4.2-2) 40123 - Rebuild of custom kernel fails with 'undefined reference' 40793 - PCMCIA services fail to recognize inserts and removals on Dell Latitude CPx with more than 256Mb RAM 41353 - Poweroff crashes just before it should power down 41856 - mtrr (write-combining) messages on Athlon 1300 43659 - Installer hangs when sym58c8xx driver loading for Tekram DC-390U3W 43940 - wvlan_cs update to 1.07 in 2.4.3-track
6. RPMs required:
Red Hat Linux 7.1:
SRPMS:

i386:






i586:


i686:





7. Verification:
MD5 sum Package Name 4fc88b39d9a4c133383e26e169ea0028 7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm 56441741db1afc54585c09d5d70958d2 7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm dc7d6ca72aa0a81cd9070ac41c00c084 7.1/en/os/i386/kernel-2.4.3-12.i386.rpm 33eaefca0670a7908d2dd27bae24937a 7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm d6494b754931b3f8cad2a9db985e9183 7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm 6409be31e631616ad1382dd8abe49009 7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm 047d31db622884f59036b2de6c02f72a 7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm f2c2424f9ab4e04ae10ca81ef971edca 7.1/en/os/i586/kernel-2.4.3-12.i586.rpm dc5b453ba1f85cbe7747c016fe957c5c 7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm 6e4dfbf5e9381a7c37113f61d77276df 7.1/en/os/i686/kernel-2.4.3-12.i686.rpm 0ef5481dd241cdae1df75b7f4cd3a213 7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm 5588b32b37b96493ce4d37eaaa1e2f3f 7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:

You can verify each package with the following command: rpm --checksig
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg

References

Support Support Copyright(c) 2000, 2001 Red Hat, Inc. `

Package List


Severity
Advisory ID: RHSA-2001:084-03
Issued Date: : 2001-06-21
Updated on: 2001-06-21
Product: Red Hat Linux
Keywords: iptables FTP ip_conntrack_ftp kernel
Cross references:
Obsoletes: RHSA-2001:052-02

Topic


Topic

A security hole has been found that does not affect the default

configuration of Red Hat Linux, but it can affect some custom

configurations of Red Hat Linux 7.1. The bug is specific

to the Linux 2.4 kernel series. Aside from the fix, countless bugfixes

have been applied to this kernel as a result of code-audits by the

MC project of the Stanford University and others.


 

Relevant Releases Architectures

Red Hat Linux 7.1 - i386, i586, i686


Bugs Fixed


Related News