This issue now is known to affect linux-2.4 +++ This bug was initially created as a clone of Bug #147468 +++ vendor-sec made us aware of a security relevant problem yesterday (remote opps/firewall bypass) in the netdev code. http://linux.bkbits.net:8080/linux-2.5/cset@41f8843a8ZMCNuP3meYAYnnXd3CO_g This is the relevant thread: http://oss.sgi.com/archives/netdev/2005-01/msg01036.html Passed to PeterM for investigation, the patch breaks kABI.
Created attachment 112218 [details] Proposed patch from Dave Miller for RHEL3
A fix for this problem has just been committed to the RHEL3 E5 patch pool this evening (in kernel version 2.4.21-27.0.3.EL).
A fix for this problem has also been committed to the RHEL3 U5 patch pool this evening (in kernel version 2.4.21-32.EL).
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-293.html
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-294.html