E por falar em iptables deem uma olhada nisso...

> > ---------------------------------------------------------------------
> >                    Red Hat, Inc. Red Hat Security Advisory
> >
> > Synopsis:          Kernel: FTP iptables vulnerability in 2.4 kernel and
general bug fixes
> > Advisory ID:       RHSA-2001:084-03
> > Issue date:        2001-06-21
> > Updated on:        2001-06-21
> > Product:           Red Hat Linux
> > Keywords:          iptables FTP ip_conntrack_ftp kernel
> > Cross references:
> > Obsoletes:         RHSA-2001:052-02
> > ---------------------------------------------------------------------
> >
> > 1. Topic:
> >
> > A security hole has been found that does not affect the default
> > configuration of Red Hat Linux, but it can affect some custom
> > configurations of Red Hat Linux 7.1. The bug is specific
> > to the Linux 2.4 kernel series. Aside from the fix, countless bugfixes
> > have been applied to this kernel as a result of code-audits by the
> > MC project of the Stanford University and others.
> >
> > 2. Relevant releases/architectures:
> >
> > Red Hat Linux 7.1 - i386, i586, i686
> >
> > 3. Problem description:
> >
> > A vulnerability in iptables "RELATED" connection tracking has been
> > discovered. When using iptables to allow FTP "RELATED" connections
> > through the firewall, carefully constructed PORT commands can open
> > arbitrary holes in the firewall.
> >
> > Default installations of Red Hat Linux 7.1 are not vulnerable; however
> > upgrading to this kernel is recommended regardless in order to benefit
from
> > the other bug fixes in this kernel.
> >
> > 4. Solution:
> >
> > Before applying this update, make sure all previously released errata
> > relevant to your system have been applied.
> >
> > The procedure for upgrading the kernel is documented at:
> >
> >
http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html
> >
> > Please read the directions for your architecture carefully before
> > proceeding with the kernel upgrade.
> >
> > Please note that this update is also available via Red Hat Network.
Many
> > people find this an easier way to apply updates.  To use Red Hat
Network,
> > launch the Red Hat Update Agent with the following command:
> >
> > up2date
> >
> > This will start an interactive process that will result in the
appropriate
> > RPMs being upgraded on your system.
> >
> > 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
> >
> > 26999 - drm:r128_do_wait_for_fifo
> > 29140 - Garbage output reported in kernel startup scanning DMA zones
> > 29573 - erroneous IRQ conflict message
> > 29555 - [aic7xxx] Installer hangs loading the aic7xxx module
> > 29730 - Installer hangs when mounting IDE CDROM
> > 31769 - Kernel fails to load cs46xx module on an IBM Thinkpad T20
> > 32723 - No Bass on Sound Blaster Live (emu10k1 chip)  on 2.4.x kernel
> > 36897 - missing entry in listing of an NFS directory served by IRIX
> > 38429 - Ext2 file corruption with RH71 2.4.2-2 kernel and ServerWorks
chipset
> > 38536 - ide=reverse option not in install kernel
> > 38588 - Installer hangs during package upgrades from 6.2
> > 39445 - pcnet32: warning: PROM address does not match CSR addre
> > 39468 - Integration of TUX broke higher number system calls
> > 39845 - mtrr not working properly (kernel 2.4.2-2)
> > 40123 - Rebuild of custom kernel fails with 'undefined reference'
> > 40793 - PCMCIA services fail to recognize inserts and removals on Dell
Latitude CPx with more than 256Mb RAM
> > 41353 - Poweroff crashes just before it should power down
> > 41856 - mtrr (write-combining) messages on Athlon 1300
> > 43659 - Installer hangs when sym58c8xx driver loading for Tekram
DC-390U3W
> > 43940 - wvlan_cs update to 1.07 in 2.4.3-track
> >
> > 6. RPMs required:
> >
> > Red Hat Linux 7.1:
> >
> > SRPMS:
> > ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm
> >
> > i386:
> > ftp://updates.redhat.com/7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm
> > ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.3-12.i386.rpm
> > ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm
> > ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm
> > ftp://updates.redhat.com/7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm
> > ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm
> >
> > i586:
> > ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.3-12.i586.rpm
> > ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm
> >
> > i686:
> > ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.3-12.i686.rpm
> >
ftp://updates.redhat.com/7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm
> > ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm
> >
> > 7. Verification:
> >
> > MD5 sum                           Package Name
>
> --------------------------------------------------------------------------
> > 4fc88b39d9a4c133383e26e169ea0028 7.1/en/os/SRPMS/kernel-2.4.3-12.src.rpm
> > 56441741db1afc54585c09d5d70958d2 7.1/en/os/i386/devfsd-2.4.3-12.i386.rpm
> > dc7d6ca72aa0a81cd9070ac41c00c084 7.1/en/os/i386/kernel-2.4.3-12.i386.rpm
> > 33eaefca0670a7908d2dd27bae24937a
7.1/en/os/i386/kernel-BOOT-2.4.3-12.i386.rpm
> > d6494b754931b3f8cad2a9db985e9183
7.1/en/os/i386/kernel-doc-2.4.3-12.i386.rpm
> > 6409be31e631616ad1382dd8abe49009
7.1/en/os/i386/kernel-headers-2.4.3-12.i386.rpm
> > 047d31db622884f59036b2de6c02f72a
7.1/en/os/i386/kernel-source-2.4.3-12.i386.rpm
> > f2c2424f9ab4e04ae10ca81ef971edca 7.1/en/os/i586/kernel-2.4.3-12.i586.rpm
> > dc5b453ba1f85cbe7747c016fe957c5c
7.1/en/os/i586/kernel-smp-2.4.3-12.i586.rpm
> > 6e4dfbf5e9381a7c37113f61d77276df 7.1/en/os/i686/kernel-2.4.3-12.i686.rpm
> > 0ef5481dd241cdae1df75b7f4cd3a213
7.1/en/os/i686/kernel-enterprise-2.4.3-12.i686.rpm
> > 5588b32b37b96493ce4d37eaaa1e2f3f
7.1/en/os/i686/kernel-smp-2.4.3-12.i686.rpm
> >
> > These packages are GPG signed by Red Hat, Inc. for security.  Our key
> > is available at:
> >     http://www.redhat.com/corp/contact.html
> >
> > You can verify each package with the following command:
> >     rpm --checksig  <filename>
> >
> > If you only wish to verify that each package has not been corrupted or
> > tampered with, examine only the md5sum with the following command:
> >     rpm --checksig --nogpg <filename>
> >
> > 8. References:
> >
> > http://www.redhat.com/support/errata/RHSA-2001-052.html
> >
http://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html
> >
> > Copyright(c) 2000, 2001 Red Hat, Inc.


_______________________________________________
slack-users mailing list
[EMAIL PROTECTED]
http://www.linuxmag.com.br/mailman/listinfo/slack-users

Responder a