LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: 'kernel' IRC Connection tracking vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux The Linux Netfilter team has found a problem in the "IRC connectiontracking" component of the firewall within the linux kernel. This problemaffects Red Hat Linux versions 7.1 and 7.2.

--------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Updated 2.4 kernel available
Advisory ID:       RHSA-2002:028-13
Issue date:        2002-02-13
Updated on:        2002-02-27
Product:           Red Hat Linux
Keywords:          irc connection tracking netfilter lcall
Cross references:  
Obsoletes:         RHSA-2002:007
---------------------------------------------------------------------

1. Topic:

The Linux Netfilter team has found a problem in the "IRC connection
tracking" component of the firewall within the linux kernel. This problem
affects Red Hat Linux versions 7.1 and 7.2.

2. Relevant releases/architectures:

Red Hat Linux 7.1 - alpha, athlon, i386, i586, i686, ia64

Red Hat Linux 7.2 - athlon, i386, i586, i686, ia64, s390

3. Problem description:

The Linux Netfilter team has found a problem in the IRC connection
tracking component of the firewall within the linux kernel. This component
is distributed with kernels in Red Hat Linux 7.1 and 7.2, although it is
not used in default installations.

The problem consists of an excessively broad netmask setting which is
applied to check if an "IRC DCC" connection through a masquerading firewall
should be allowed. This results in unwanted ports being opened on the
firewall, which could, depending on the firewall filter ruleset, allow
inbound connections.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2002-0060 to this issue.  Thanks to Jozsef Kadlecsik
and Harald Welte of the netfilter team.

Users are advised to upgrade to this errata kernel containing patches
which fix these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied. Red Hat Linux 7.1 users should
update the packages in the XFree86 Erratum (RHEA-2002:010).

The procedure for upgrading the kernel is documented at:
 
http://www.Red Hat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

Note for customers using Red Hat Linux for the IBM s/390:

Users of Red Hat Linux for the IBM s/390 with binary only kernel modules
(OCO) should contact their vendor to obtain updated modules for this kernel
patch.

5. Bug IDs fixed  (http://bugzilla.Red Hat.com/bugzilla for more info):



6. RPMs required:

Red Hat Linux 7.1:

SRPMS: 
ftp://updates.Red Hat.com/7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm

alpha: 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm 
ftp://updates.Red Hat.com/7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm

athlon: 
ftp://updates.Red Hat.com/7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm 
ftp://updates.Red Hat.com/7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm

i386: 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm

i586: 
ftp://updates.Red Hat.com/7.1/en/os/i586/kernel-2.4.9-31.i586.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm

i686: 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm

ia64: 
ftp://updates.Red Hat.com/7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm

Red Hat Linux 7.2:

SRPMS: 
ftp://updates.Red Hat.com/7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm

athlon: 
ftp://updates.Red Hat.com/7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm 
ftp://updates.Red Hat.com/7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm

i386: 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm

i586: 
ftp://updates.Red Hat.com/7.2/en/os/i586/kernel-2.4.9-31.i586.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm

i686: 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm 
ftp://updates.Red Hat.com/7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm

ia64: 
ftp://updates.Red Hat.com/7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm 
ftp://updates.Red Hat.com/7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm

s390: 
ftp://updates.Red Hat.com/7.2/en/os/s390/kernel-2.4.9-31.s390.rpm 
ftp://updates.Red Hat.com/7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm 
ftp://updates.Red Hat.com/7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm 
ftp://updates.Red Hat.com/7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm 
ftp://updates.Red Hat.com/7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
599a9027496067a54b46716c4af2184a 7.1/en/os/SRPMS/kernel-2.4.9-31.src.rpm
4bccc363fdf0f00805ef4c34bbf8b43d 7.1/en/os/alpha/kernel-2.4.9-31.alpha.rpm
92f4dd670944fd607181089b04a1dcd9 7.1/en/os/alpha/kernel-BOOT-2.4.9-31.alpha.rpm
5cb53f48285237d8027b17604ab39616 7.1/en/os/alpha/kernel-doc-2.4.9-31.alpha.rpm
9f95ed2c259c6eeb2cbc13a8e21a447c 7.1/en/os/alpha/kernel-headers-2.4.9-31.alpha.rpm
d43622963a55e817233a258d8318a120 7.1/en/os/alpha/kernel-smp-2.4.9-31.alpha.rpm
9d43960cc26be1783d8004addbb2bb9b 7.1/en/os/alpha/kernel-source-2.4.9-31.alpha.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.1/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.1/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.1/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.1/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.1/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.1/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.1/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.1/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.1/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.1/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.1/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.1/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.1/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.1/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.1/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.1/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.1/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.1/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
599a9027496067a54b46716c4af2184a 7.2/en/os/SRPMS/kernel-2.4.9-31.src.rpm
8b0c9d11ee3f66790b4dca48f018e10b 7.2/en/os/athlon/kernel-2.4.9-31.athlon.rpm
8e710a5f2a98932c2bc9e0d3d073e244 7.2/en/os/athlon/kernel-smp-2.4.9-31.athlon.rpm
64705698f9f5eaf1e79185863382f941 7.2/en/os/i386/kernel-2.4.9-31.i386.rpm
b239ceebf5b5c28a348cd960d3195f03 7.2/en/os/i386/kernel-BOOT-2.4.9-31.i386.rpm
6883d71ffe17dff75514ac38228cd5f0 7.2/en/os/i386/kernel-doc-2.4.9-31.i386.rpm
dae89931407ae5832e374e49d8347234 7.2/en/os/i386/kernel-headers-2.4.9-31.i386.rpm
cba833ad4e2b45392e4de085ca0e920f 7.2/en/os/i386/kernel-source-2.4.9-31.i386.rpm
8e50430f6c4f452d2625819ba7464c47 7.2/en/os/i586/kernel-2.4.9-31.i586.rpm
e72f4fd75463bba1d51b7c7df1999704 7.2/en/os/i586/kernel-smp-2.4.9-31.i586.rpm
5e2b0b72141cbba077eb9c6b4d99991c 7.2/en/os/i686/kernel-2.4.9-31.i686.rpm
a744dabe626acd95740aeb9af88b6d5b 7.2/en/os/i686/kernel-debug-2.4.9-31.i686.rpm
aea058a30a30b3708b988c326ada6d0a 7.2/en/os/i686/kernel-enterprise-2.4.9-31.i686.rpm
3af0f1894a0c8b80486146298144727a 7.2/en/os/i686/kernel-smp-2.4.9-31.i686.rpm
322164648ff900315ea8d062f43de2e8 7.2/en/os/ia64/kernel-2.4.9-31.ia64.rpm
3f7c2c541be3797083cc7ac32e0fdebd 7.2/en/os/ia64/kernel-doc-2.4.9-31.ia64.rpm
c8681048d6817a289ca59e0b4c38e611 7.2/en/os/ia64/kernel-headers-2.4.9-31.ia64.rpm
19026b6d0ce77ce6ced75aa5de77b49a 7.2/en/os/ia64/kernel-smp-2.4.9-31.ia64.rpm
2bdf102fd5b9e7b7e04c6e14d258eeae 7.2/en/os/ia64/kernel-source-2.4.9-31.ia64.rpm
03414b5deff2f6f673342ea3b8d5cf63 7.2/en/os/s390/kernel-2.4.9-31.s390.rpm
29db2044bac2e46027afa7479f39a394 7.2/en/os/s390/kernel-BOOT-2.4.9-31.s390.rpm
b24851e70837659048e8416e0552fb0f 7.2/en/os/s390/kernel-doc-2.4.9-31.s390.rpm
b5ad515e3bffc79fdbc73a3e0b07b5cc 7.2/en/os/s390/kernel-headers-2.4.9-31.s390.rpm
27d48439af20ab9f9b6ad84942913fe7 7.2/en/os/s390/kernel-source-2.4.9-31.s390.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     http://www.Red Hat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
http://www.netfilter.org/security/irc-dcc-mask.html 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0060


Copyright(c) 2000, 2001 Red Hat, Inc.





 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.