[devel] [redhat-announce-list-admin на redhat.com: [RHSA-2002:028-13] Updated 2.4 kernel available]
Dmitry V. Levin
=?iso-8859-1?q?ldv_=CE=C1_alt-linux=2Eorg?=
Чт Фев 28 11:33:12 MSK 2002
Костя, где обещанное обновление для Castle & Junior?
----- Forwarded message from redhat-announce-list-admin на redhat.com -----
Date: Wed, 27 Feb 2002 14:59 -0500
From: redhat-announce-list-admin на redhat.com
To: redhat-watch-list на redhat.com
Cc: bugtraq на securityfocus.com, linux-security на redhat.com,
editor на lwn.net
Subject: [RHSA-2002:028-13] Updated 2.4 kernel available
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated 2.4 kernel available
Advisory ID: RHSA-2002:028-13
Issue date: 2002-02-13
Updated on: 2002-02-27
Product: Red Hat Linux
Keywords: irc connection tracking netfilter lcall
Cross references:
Obsoletes: RHSA-2002:007
---------------------------------------------------------------------
1. Topic:
The Linux Netfilter team has found a problem in the "IRC connection
tracking" component of the firewall within the linux kernel. This problem
affects Red Hat Linux versions 7.1 and 7.2.
2. Relevant releases/architectures:
Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64
Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64, s390
3. Problem description:
The Linux Netfilter team has found a problem in the IRC connection
tracking component of the firewall within the linux kernel. This component
is distributed with kernels in Red Hat Linux 7.1 and 7.2, although it is
not used in default installations.
The problem consists of an excessively broad netmask setting which is
applied to check if an "IRC DCC" connection through a masquerading firewall
should be allowed. This results in unwanted ports being opened on the
firewall, which could, depending on the firewall filter ruleset, allow
inbound connections.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2002-0060 to this issue. Thanks to Jozsef Kadlecsik
and Harald Welte of the netfilter team.
Users are advised to upgrade to this errata kernel containing patches
which fix these issues.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. Red Hat Linux 7.1 users should
update the packages in the XFree86 Erratum (RHEA-2002:010).
The procedure for upgrading the kernel is documented at:
http://www.redhat.com/support/docs/howto/kernel-upgrade/
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.
Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.
Note for customers using Red Hat Linux for the IBM s/390:
Users of Red Hat Linux for the IBM s/390 with binary only kernel modules
(OCO) should contact their vendor to obtain updated modules for this kernel
patch.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
6. RPMs required:
Red Hat Linux 7.1:
SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
Red Hat Linux 7.2:
SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
ia64:
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
ftp://updates.redhat.com/7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
s390:
ftp://updates.redhat.com/7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
ftp://updates.redhat.com/7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
ftp://updates.redhat.com/7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
ftp://updates.redhat.com/7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
ftp://updates.redhat.com/7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
599a9027496067a54b46716c4af2184a 7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
4bccc363fdf0f00805ef4c34bbf8b43d 7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
92f4dd670944fd607181089b04a1dcd9 7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
5cb53f48285237d8027b17604ab39616 7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
9f95ed2c259c6eeb2cbc13a8e21a447c 7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
d43622963a55e817233a258d8318a120 7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
9d43960cc26be1783d8004addbb2bb9b 7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
599a9027496067a54b46716c4af2184a 7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
03414b5deff2f6f673342ea3b8d5cf63 7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
29db2044bac2e46027afa7479f39a394 7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
b24851e70837659048e8416e0552fb0f 7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
b5ad515e3bffc79fdbc73a3e0b07b5cc 7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
27d48439af20ab9f9b6ad84942913fe7 7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/about/contact/pgpkey.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.netfilter.org/security/irc-dcc-mask.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0060
Copyright(c) 2000, 2001 Red Hat, Inc.
_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list
_______________________________________________
redhat-announce-list mailing list
redhat-announce-list на redhat.com
https://listman.redhat.com/mailman/listinfo/redhat-announce-list
----- End forwarded message -----
Regards,
Dmitry
+-------------------------------------------------------------------------+
Dmitry V. Levin mailto://ldv@alt-linux.org
ALT Linux Team http://www.altlinux.com/
Fandra Project http://www.fandra.org/
+-------------------------------------------------------------------------+
UNIX is user friendly. It's just very selective about who its friends are.
----------- следующая часть -----------
Было удалено вложение не в текстовом формате...
Имя : =?iso-8859-1?q?=CF=D4=D3=D5=D4=D3=D4=D7=D5=C5=D4?=
Тип : application/pgp-signature
Размер : 232 байтов
Описание: =?iso-8859-1?q?=CF=D4=D3=D5=D4=D3=D4=D7=D5=C5=D4?=
Url : <http://lists.altlinux.org/pipermail/devel/attachments/20020228/f06754ff/attachment-0001.bin>
Подробная информация о списке рассылки Devel