lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1COf5h-000pwYC__38519.9730204933$1099360690$gmane$org@finlandia.Infodrom.North.DE>
Date: Mon, 1 Nov 2004 17:31:33 +0100 (CET)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 580-1] New iptables packages fix modprobe failure


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 580-1                     security@...ian.org
http://www.debian.org/security/                             Martin Schulze
November 1st, 2004                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : iptables
Vulnerability  : missing initialisation
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2004-0986
Debian Bug     : 219686

Faheem Mitha noticed that the iptables command, an administration tool
for IPv4 packet filtering and NAT, did not always load the required
modules on it own as it was supposed to.  This could lead to firewall
rules not being loaded on system startup.  This caused a failure in
connection with rules provided by lokkit at least.

For the stable distribution (woody) this problem has been fixed in
version 1.2.6a-5.0woody2.

For the unstable distribution (sid) this problem has been fixed in
version 1.2.11-4.

We recommend that you upgrade your iptables package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2.dsc
      Size/MD5 checksum:      639 03ce7ecd0cc462b0b0bef08d400f5a39
    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2.diff.gz
      Size/MD5 checksum:    82136 6c6305ebf8da551d7cbdfc4fe1149d87
    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a.orig.tar.gz
      Size/MD5 checksum:   422313 84aed37b27830c1a74ece6765db0c31c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_alpha.deb
      Size/MD5 checksum:   377404 4adc7c8e3b71d6732fe36a223d044fc7
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_alpha.deb
      Size/MD5 checksum:   110230 c0e0ecb43614186556adcd714e4d1272

  ARM architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_arm.deb
      Size/MD5 checksum:   314110 8d0b4d2e6d7af1377cccf91898a7bda6
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_arm.deb
      Size/MD5 checksum:    99130 aff30c9fc49fed3c4b21f418b43c4e65

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_i386.deb
      Size/MD5 checksum:   287114 b0ff0f6ab787a136d7ef6f8819b04f96
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_i386.deb
      Size/MD5 checksum:    96442 1c2d7ec853da4fdca2ca4e5bddd6740f

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_ia64.deb
      Size/MD5 checksum:   446814 e9ea93b92e97a66164411be155b93598
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_ia64.deb
      Size/MD5 checksum:   116386 42deb79a474dd9d78bddfe723b4ee6c4

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_hppa.deb
      Size/MD5 checksum:   345212 4866e88ca61f8ac2778cc3ce44d142ac
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_hppa.deb
      Size/MD5 checksum:    95430 c60ef8c05e0c238d8ac7682626f3972d

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_m68k.deb
      Size/MD5 checksum:   289032 f7748d7e5cc9726b7142d918712abd6d
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_m68k.deb
      Size/MD5 checksum:    91232 37e6e304f0b4ebf666c4ffc860253a73

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_mips.deb
      Size/MD5 checksum:   326050 713a2efd308c98a3a48135664c7a385c
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_mips.deb
      Size/MD5 checksum:   106754 f44458bc89644ddb91a63caa498456ad

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_mipsel.deb
      Size/MD5 checksum:   327082 731e9de4f81d6ecc114c89b2c54e99c7
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_mipsel.deb
      Size/MD5 checksum:   106898 25d89525b8d158f12eaaf2db6635fd14

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_powerpc.deb
      Size/MD5 checksum:   321422 a73bf7a5f4696a44abe4dc19d9508cc8
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_powerpc.deb
      Size/MD5 checksum:   101350 e81ceac78d6a38cfdd6b8f09e0cb176e

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_s390.deb
      Size/MD5 checksum:   307826 1092ceb008461ac0323b2ddfc2327c22
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_s390.deb
      Size/MD5 checksum:    97020 c5079802be1fed9934527371cf6a99d8

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/i/iptables/iptables_1.2.6a-5.0woody2_sparc.deb
      Size/MD5 checksum:   323322 b33b11c7b474c50a84087f99580c122c
    http://security.debian.org/pool/updates/main/i/iptables/iptables-dev_1.2.6a-5.0woody2_sparc.deb
      Size/MD5 checksum:    98876 dc0ed1d555df1abb1868514fa307a88c


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBhmTlW5ql+IAeqTIRAhjTAKCH0M8Oz0a5MAXA3NZzk3FufsHzAQCZASWi
cE4GcVBtJ3eVv3jEUr14OeQ=
=agdX
-----END PGP SIGNATURE-----



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ