|[Home] [Credit Search] [Category Browser] [Staff Roll Call]||The LINUX.COM Article Archive|
|Originally Published: Wednesday, 17 May 2000||Author: Alexander Reelsen|
|Published to: news_enhance_security/Security News||Page: 1/1 - [Printable]|
SuSE security announcement - kernel
SuSE released a security announcement and a kernel patch for the common ipchains problem, what allows to create arbitrary connections from outside.
|Page 1 of 1|
Date: Wed, 17 May 2000 20:50:25 +0200 (MEST) From: email@example.com (Marc Heuse) Subject: [suse-security] SuSE Security Announcement - kernel
SuSE Security Announcement
Package: kernel < 2.2.15 Date: Wed, 17 May 2000 18:24:50 GMT
Affected SuSE versions: 6.1 - 6.4 Vulnerability Type: bypass ipchains filter rules denial of service SuSE default package: yes Other affected systems: all linux versions using kernel 2.2.x and several stateful firewall packages ______________________________________________________________________________
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. _____________________________________________________________________________
1. Problem Description
The masquerading feature in the Linux kernel has got a vulnerability in the udp and ftp masquerading code which allows arbitary backward connections to be opened. Some denial of service were found.
Remote users may bypass ipchains filter rules protecting the internal network. Users can crash the machine.
Update the package from our FTP server. Please note that we provide a patched 2.2.14 kernel to ensure stability and not the 2.2.15 kernel. ______________________________________________________________________________
Please verify these md5 checksums of the updates before installing: (NOTE: the 6.4 updates fit 6.1 to 6.3 as well)
765e268875a7716f681c14389a1c9b9b ftp://ftp.suse.com/pub/suse/i386/update/6.4/kernel/k_deflt.rpm be6ee213f0cafd4dac5c51a2a8d100f0 ftp://ftp.suse.com/pub/suse/i386/update/6.4/kernel/k_eide.rpm b900eb9f47c94df5cc15721e5f96a58e ftp://ftp.suse.com/pub/suse/i386/update/6.4/kernel/k_i386.rpm 37deca6ee856c3242a13c2a24f32fc7f ftp://ftp.suse.com/pub/suse/i386/update/6.4/d1/lx_suse-2.2.14.SuSE-24.i386.rpm ______________________________________________________________________________
|Page 1 of 1|