lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041104235853.9909.qmail@updates.mandrakesoft.com>
Date: 4 Nov 2004 23:58:53 -0000
From: Mandrake Linux Security Team <security@...ux-mandrake.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2004:125 - Updated iptables packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           iptables
 Advisory ID:            MDKSA-2004:125
 Date:                   November 4th, 2004

 Affected versions:	 10.0, 10.1, 9.2, Corporate Server 2.1,
			 Multi Network Firewall 8.2
 ______________________________________________________________________

 Problem Description:

 Faheem Mitha discovered that the iptables tool would not always load
 the required modules on its own as it should have, which could in turn
 lead to firewall rules not being loaded on system startup in some
 cases.
 
 The updated packages are patched to prevent this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0986
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 ea5d957312f3ce57b3dcda010ede3945  10.0/RPMS/iptables-1.2.9-5.1.100mdk.i586.rpm
 8b13818315416baa6b34db7f1926c07b  10.0/RPMS/iptables-ipv6-1.2.9-5.1.100mdk.i586.rpm
 ed24e4e4252bbbed9c2d105e2ac8bce4  10.0/SRPMS/iptables-1.2.9-5.1.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 b7a602a98403aa1ff0f88537c585fd8b  amd64/10.0/RPMS/iptables-1.2.9-5.1.100mdk.amd64.rpm
 2dcdb1f57d1314e6981fb87b538e7714  amd64/10.0/RPMS/iptables-ipv6-1.2.9-5.1.100mdk.amd64.rpm
 ed24e4e4252bbbed9c2d105e2ac8bce4  amd64/10.0/SRPMS/iptables-1.2.9-5.1.100mdk.src.rpm

 Mandrakelinux 10.1:
 2fd6b28386f1f10145bec9cbe9adcc80  10.1/RPMS/iptables-1.2.9-7.1.101mdk.i586.rpm
 df337d09fcb6a9bd950650f323ed5deb  10.1/RPMS/iptables-devel-1.2.9-7.1.101mdk.i586.rpm
 6d84f2165b614aadb36507a3e2165c74  10.1/RPMS/iptables-ipv6-1.2.9-7.1.101mdk.i586.rpm
 37b973770f7ee0ed05b9a1b2ecc363f2  10.1/SRPMS/iptables-1.2.9-7.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 36ea253f918855f8ea5f0cccb9c71d69  x86_64/10.1/RPMS/iptables-1.2.9-7.1.101mdk.x86_64.rpm
 67293e555ec345d9f8df2c98b359d7ab  x86_64/10.1/RPMS/iptables-devel-1.2.9-7.1.101mdk.x86_64.rpm
 39ba0b1ddf4d3325398b92f2559916fe  x86_64/10.1/RPMS/iptables-ipv6-1.2.9-7.1.101mdk.x86_64.rpm
 37b973770f7ee0ed05b9a1b2ecc363f2  x86_64/10.1/SRPMS/iptables-1.2.9-7.1.101mdk.src.rpm

 Corporate Server 2.1:
 d0d1946847f4355fa4505a139f6c5284  corporate/2.1/RPMS/iptables-1.2.6a-1.1.C21mdk.i586.rpm
 98316b73c9942a166f031d07cac35492  corporate/2.1/RPMS/iptables-ipv6-1.2.6a-1.1.C21mdk.i586.rpm
 77ffcb45d7b001faec0e283bb0987064  corporate/2.1/SRPMS/iptables-1.2.6a-1.1.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 a2ffbb9e0b2b20edc4354529bb18ec29  x86_64/corporate/2.1/RPMS/iptables-1.2.6a-1.1.C21mdk.x86_64.rpm
 b8484b1932147eba656de6573b94b112  x86_64/corporate/2.1/RPMS/iptables-ipv6-1.2.6a-1.1.C21mdk.x86_64.rpm
 77ffcb45d7b001faec0e283bb0987064  x86_64/corporate/2.1/SRPMS/iptables-1.2.6a-1.1.C21mdk.src.rpm

 Mandrakelinux 9.2:
 6a888b74c8d6b0491d5e365b100735d7  9.2/RPMS/iptables-1.2.8-2.1.92mdk.i586.rpm
 01ad9046156cd1621214891ed9f239eb  9.2/RPMS/iptables-ipv6-1.2.8-2.1.92mdk.i586.rpm
 86e7d2322395547ca0e3d68ebf783dd3  9.2/SRPMS/iptables-1.2.8-2.1.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 961b11f6868a9101609891cb51d2d245  amd64/9.2/RPMS/iptables-1.2.8-2.1.92mdk.amd64.rpm
 955bf909b3c4d7b460037f8f55f23513  amd64/9.2/RPMS/iptables-ipv6-1.2.8-2.1.92mdk.amd64.rpm
 86e7d2322395547ca0e3d68ebf783dd3  amd64/9.2/SRPMS/iptables-1.2.8-2.1.92mdk.src.rpm

 Multi Network Firewall 8.2:
 3bae3f63666aeba5939cfaed2c861405  mnf8.2/RPMS/iptables-1.2.5-1.1.M82mdk.i586.rpm
 0422c6867fec60ca167d6aeddfd30fbf  mnf8.2/RPMS/iptables-ipv6-1.2.5-1.1.M82mdk.i586.rpm
 acc628f4f4582e794a29d0044d0617d3  mnf8.2/SRPMS/iptables-1.2.5-1.1.M82mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBisI9mqjQ0CJFipgRAozsAJsGIeQhHWzrNpLa1Ikv3jWSDYFQjgCg10gv
/VV+PgUPqBC/7KaE0Zhkdbs=
=99CC
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ