`

--------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated 2.4 kernel available
Advisory ID:       RHSA-2002:028-13
Issue date:        2002-02-13
Updated on:        2002-02-27
Product:           Red Hat Linux
Keywords:          irc connection tracking netfilter lcall
Cross references:  
Obsoletes:         RHSA-2002:007
---------------------------------------------------------------------

1. Topic:

The Linux Netfilter team has found a problem in the "IRC connection
tracking" component of the firewall within the linux kernel. This problem
affects Red Hat Linux versions 7.1 and 7.2.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64

Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64, s390

3. Problem description:

The Linux Netfilter team has found a problem in the IRC connection
tracking component of the firewall within the linux kernel. This component
is distributed with kernels in Red Hat Linux 7.1 and 7.2, although it is
not used in default installations.

The problem consists of an excessively broad netmask setting which is
applied to check if an "IRC DCC" connection through a masquerading firewall
should be allowed. This results in unwanted ports being opened on the
firewall, which could, depending on the firewall filter ruleset, allow
inbound connections.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2002-0060 to this issue.  Thanks to Jozsef Kadlecsik
and Harald Welte of the netfilter team.

Users are advised to upgrade to this errata kernel containing patches
which fix these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied. Red Hat Linux 7.1 users should
update the packages in the XFree86 Erratum (RHEA-2002:010).

The procedure for upgrading the kernel is documented at:
 
Support

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

Note for customers using Red Hat Linux for the IBM s/390:

Users of Red Hat Linux for the IBM s/390 with binary only kernel modules
(OCO) should contact their vendor to obtain updated modules for this kernel
patch.

5. Bug IDs fixed  (  for more info):



6. RPMs required:

Red Hat Linux 7.1:

SRPMS: 
 

alpha: 
  
  
  
  
  
 

athlon: 
  
 

i386: 
  
  
  
  
 

i586: 
  
 

i686: 
  
  
  
 

ia64: 
  
  
  
  
 

Red Hat Linux 7.2:

SRPMS: 
 

athlon: 
  
 

i386: 
  
  
  
  
 

i586: 
  
 

i686: 
  
  
  
 

ia64: 
  
  
  
  
 

s390: 
  
  
  
  
 



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
599a9027496067a54b46716c4af2184a 7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
4bccc363fdf0f00805ef4c34bbf8b43d 7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
92f4dd670944fd607181089b04a1dcd9 7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
5cb53f48285237d8027b17604ab39616 7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
9f95ed2c259c6eeb2cbc13a8e21a447c 7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
d43622963a55e817233a258d8318a120 7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
9d43960cc26be1783d8004addbb2bb9b 7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
599a9027496067a54b46716c4af2184a 7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
03414b5deff2f6f673342ea3b8d5cf63 7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
29db2044bac2e46027afa7479f39a394 7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
b24851e70837659048e8416e0552fb0f 7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
b5ad515e3bffc79fdbc73a3e0b07b5cc 7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
27d48439af20ab9f9b6ad84942913fe7 7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     About

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
  
CVE -CVE-2002-0060


Copyright(c) 2000, 2001 Red Hat, Inc.





`

RedHat: 'kernel' IRC Connection tracking vulnerability

The Linux Netfilter team has found a problem in the "IRC connectiontracking" component of the firewall within the linux kernel

Summary



Summary

The Linux Netfilter team has found a problem in the IRC connectiontracking component of the firewall within the linux kernel. This componentis distributed with kernels in Red Hat Linux 7.1 and 7.2, although it isnot used in default installations.The problem consists of an excessively broad netmask setting which isapplied to check if an "IRC DCC" connection through a masquerading firewallshould be allowed. This results in unwanted ports being opened on thefirewall, which could, depending on the firewall filter ruleset, allowinbound connections.The Common Vulnerabilities and Exposures project (cve.mitre.org) hasassigned the name CAN-2002-0060 to this issue. Thanks to Jozsef Kadlecsikand Harald Welte of the netfilter team.Users are advised to upgrade to this errata kernel containing patcheswhich fix these issues.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied. Red Hat Linux 7.1 users should update the packages in the XFree86 Erratum (RHEA-2002:010).
The procedure for upgrading the kernel is documented at:
Support
Please read the directions for your architecture carefully before proceeding with the kernel upgrade.
Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date.
Note for customers using Red Hat Linux for the IBM s/390:
Users of Red Hat Linux for the IBM s/390 with binary only kernel modules (OCO) should contact their vendor to obtain updated modules for this kernel patch.
5. Bug IDs fixed ( for more info):


6. RPMs required:
Red Hat Linux 7.1:
SRPMS:

alpha:






athlon:


i386:





i586:


i686:




ia64:





Red Hat Linux 7.2:
SRPMS:

athlon:


i386:





i586:


i686:




ia64:





s390:







7. Verification:
MD5 sum Package Name 599a9027496067a54b46716c4af2184a 7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm 4bccc363fdf0f00805ef4c34bbf8b43d 7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm 92f4dd670944fd607181089b04a1dcd9 7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm 5cb53f48285237d8027b17604ab39616 7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm 9f95ed2c259c6eeb2cbc13a8e21a447c 7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm d43622963a55e817233a258d8318a120 7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm 9d43960cc26be1783d8004addbb2bb9b 7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm 8b0c9d11ee3f66790b4dca48f018e10b 7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm 8e710a5f2a98932c2bc9e0d3d073e244 7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm 64705698f9f5eaf1e79185863382f941 7.1/en/os/i386/kernel-2.4.9-31.i386.rpm b239ceebf5b5c28a348cd960d3195f03 7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm 6883d71ffe17dff75514ac38228cd5f0 7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm dae89931407ae5832e374e49d8347234 7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm cba833ad4e2b45392e4de085ca0e920f 7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm 8e50430f6c4f452d2625819ba7464c47 7.1/en/os/i586/kernel-2.4.9-31.i586.rpm e72f4fd75463bba1d51b7c7df1999704 7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm 5e2b0b72141cbba077eb9c6b4d99991c 7.1/en/os/i686/kernel-2.4.9-31.i686.rpm a744dabe626acd95740aeb9af88b6d5b 7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm aea058a30a30b3708b988c326ada6d0a 7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm 3af0f1894a0c8b80486146298144727a 7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm 322164648ff900315ea8d062f43de2e8 7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm 3f7c2c541be3797083cc7ac32e0fdebd 7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm c8681048d6817a289ca59e0b4c38e611 7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm 19026b6d0ce77ce6ced75aa5de77b49a 7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm 2bdf102fd5b9e7b7e04c6e14d258eeae 7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm 599a9027496067a54b46716c4af2184a 7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm 8b0c9d11ee3f66790b4dca48f018e10b 7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm 8e710a5f2a98932c2bc9e0d3d073e244 7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm 64705698f9f5eaf1e79185863382f941 7.2/en/os/i386/kernel-2.4.9-31.i386.rpm b239ceebf5b5c28a348cd960d3195f03 7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm 6883d71ffe17dff75514ac38228cd5f0 7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm dae89931407ae5832e374e49d8347234 7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm cba833ad4e2b45392e4de085ca0e920f 7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm 8e50430f6c4f452d2625819ba7464c47 7.2/en/os/i586/kernel-2.4.9-31.i586.rpm e72f4fd75463bba1d51b7c7df1999704 7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm 5e2b0b72141cbba077eb9c6b4d99991c 7.2/en/os/i686/kernel-2.4.9-31.i686.rpm a744dabe626acd95740aeb9af88b6d5b 7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm aea058a30a30b3708b988c326ada6d0a 7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm 3af0f1894a0c8b80486146298144727a 7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm 322164648ff900315ea8d062f43de2e8 7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm 3f7c2c541be3797083cc7ac32e0fdebd 7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm c8681048d6817a289ca59e0b4c38e611 7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm 19026b6d0ce77ce6ced75aa5de77b49a 7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm 2bdf102fd5b9e7b7e04c6e14d258eeae 7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm 03414b5deff2f6f673342ea3b8d5cf63 7.2/en/os/s390/kernel-2.4.9-31.s390.rpm 29db2044bac2e46027afa7479f39a394 7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm b24851e70837659048e8416e0552fb0f 7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm b5ad515e3bffc79fdbc73a3e0b07b5cc 7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm 27d48439af20ab9f9b6ad84942913fe7 7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: About
You can verify each package with the following command: rpm --checksig
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg

References

CVE -CVE-2002-0060 Copyright(c) 2000, 2001 Red Hat, Inc. `

Package List


Severity
Advisory ID: RHSA-2002:028-13
Issued Date: : 2002-02-13
Updated on: 2002-02-27
Product: Red Hat Linux
Keywords: irc connection tracking netfilter lcall
Cross references:
Obsoletes: RHSA-2002:007

Topic


Topic

The Linux Netfilter team has found a problem in the "IRC connection

tracking" component of the firewall within the linux kernel. This problem

affects Red Hat Linux versions 7.1 and 7.2.


 

Relevant Releases Architectures

Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64

Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64, s390


Bugs Fixed


Related News