BLAG Forums
It is currently Mon Feb 19, 2018 7:32 am

All times are UTC

Post new topic Reply to topic  [ 1 post ] 
Author Message
PostPosted: Sat Mar 05, 2005 2:27 am 

Joined: Mon Mar 15, 2004 8:17 pm
Posts: 415
Location: ny
Fedora Legacy Update Advisory

Synopsis: Updated iptables packages resolve security issues
Advisory ID: FLSA:2252
Issue date: 2005-02-10
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix
Cross references:
CVE Names: CAN-2004-0986

1. Topic:

Updated iptables packages that correct a security problem are now

The iptables utility controls the network packet filtering code in the
Linux kernel.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386

3. Problem description:

Under certain conditions, iptables did not properly load the required
modules at system startup, which caused the firewall rules to fail to
load and protect the system from remote attackers. The Common
Vulnerabilities and Exposures project ( has assigned the
name CAN-2004-0986 to this issue.

Users of iptables are advised to upgrade to these errata packages, which
contain backported patches correcting these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www for directions on how to
configure yum and apt-get.

5. Bug IDs fixed: - bug #2252 - iptables May Fail to
Automatically Load Some Modules

6. RPMs required:

Red Hat Linux 9:

SRPM: ... cy.src.rpm

i386: ... y.i386.rpm ... y.i386.rpm

7. Verification:

SHA1 sum Package Name


These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

rpm –checksig -v

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:


Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

All times are UTC

Who is online

Users browsing this forum: No registered users and 3 guests

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group