found 318946 2.2.3-1
thanks

(2.2.3-1 is the version in sarge.  Hopefully this prevents the bug
from being archived.)

| Description
| 
| A security vulnerability has been discovered which affects all
| supported stable versions of Shorewall.  This vulnerability enables
| a client accepted by MAC address filtering to bypass any other rule.
| If MACLIST_TTL is set to a value greater than 0 or
| MACLIST_DISPOSITION is set to "ACCEPT" in
| /etc/shorewall/shorewall.conf (default is MACLIST_TTL=0 and
| MACLIST_DISPOSITION=REJECT), and a client is positively identified
| through its MAC address, it bypasses all other policies/rules in
| place, thus gaining access to all open services on the firewall.
| 
| Fix
| Workaround
| 
| For Shorewall 2.2.x or 2.4.x, set MACLIST_TTL=0 or
| MACLIST_DISPOSITION=REJECT in /etc/shorewall/shorewall.conf.  For
| Shorewall 2.0.x, set MACLIST_DISPOSITION=REJECT in
| /etc/shorewall/shorewall.conf.  MACLIST filtering is of limited
| value on Internet-connected hosts, and the Shorewall team recommends
| this approach to be used if possible.

<http://www.shorewall.net/News.htm#20050717>

Unfortunately, the errate for 2.2.5 does not apply cleanly to 2.2.3.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to