lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 10 Oct 2005 13:05:50 +0200
From: Martin Pitt <martin.pitt@...onical.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-197-1] Shorewall vulnerability

===========================================================
Ubuntu Security Notice USN-197-1	   October 10, 2005
shorewall vulnerability
CAN-2005-2317
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

shorewall

The problem can be corrected by upgrading the affected package to
version 2.0.2-4ubuntu2.1 (for Ubuntu 4.10), or 2.0.13-1ubuntu0.1 (for
Ubuntu 5.04).  In general, a standard system upgrade is sufficient to
effect the necessary changes.

Details follow:

A firewall bypass vulnerability has been found in shorewall. If
MACLIST_TTL was set to a value greater than 0 or MACLIST_DISPOSITION
was set to "ACCEPT" in /etc/shorewall/shorewall.conf, and a client was
positively identified through its MAC address, that client bypassed
all other policies/rules in place. This could allow external computers
to get access to ports that are intended to be restricted by the
firewall policy.

Please note that this does not affect the default configuration, which
does not enable MAC based client identification.


Updated packages for Ubuntu 4.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.2-4ubuntu2.1.diff.gz
      Size/MD5:    29530 7188d2c0672607fc760df58561794b41
    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.2-4ubuntu2.1.dsc
      Size/MD5:      666 dba831fba43c9826df27f162f7b3e658
    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.2.orig.tar.gz
      Size/MD5:   104461 ea85fc5cab2d09bff04d368c3b20f3e1

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.2-4ubuntu2.1_all.deb
      Size/MD5:   109346 67800229efa15b34335898eba9d4e736

Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.13-1ubuntu0.1.diff.gz
      Size/MD5:    31259 0ce979721e9d9bf3e912665ec696be60
    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.13-1ubuntu0.1.dsc
      Size/MD5:      677 81a0a178e75b7fdd07ce9d27a329a727
    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.13.orig.tar.gz
      Size/MD5:   104276 b3656ec857d55878b739d8f903de957d

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/s/shorewall/shorewall_2.0.13-1ubuntu0.1_all.deb
      Size/MD5:   125950 2971b9d2ebfbf1bf3ee3dd7d26d9fff0

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ