-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
--------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Moderate: ipsec-tools security update Advisory ID: RHSA-2005:232-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-232.html Issue date: 2005-03-23 Updated on: 2005-03-23 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-0398 ---------------------------------------------------------------------
1. Summary:
An updated ipsec-tools package that fixes a bug in parsing of ISAKMP headers is now available.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel. The ipsec-tools package includes:
- setkey, a program to directly manipulate policies and SAs - racoon, an IKEv1 keying daemon
A bug was found in the way the racoon daemon handled incoming ISAKMP requests. It is possible that an attacker could crash the racoon daemon by sending a specially crafted ISAKMP packet. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0398 to this issue.
Additionally, the following issues have been fixed: - racoon mishandled restarts in the presence of stale administration sockets. - on Red Hat Enterprise Linux 4, racoon and setkey did not properly set up forward policies, which prevented tunnels from working.
Users of ipsec-tools should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
145531 - EMBARGOED CAN-2005-0398 multiple issues with racoon 145535 - EMBARGOED CAN-2005-0398 multiple issues with racoon 148950 - racoon unable to start with stale socket /tmp/.racoon 150179 - ipsec/racoon/setkey does not properly forward packets to vpn peer
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS: ipsec-tools-0.2.5-0.7.src.rpm 04fc5b942ed112aa3d8ecd3e6e527e87 ipsec-tools-0.2.5-0.7.src.rpm
i386: 55373f7613bd894b051137eca8c799fb ipsec-tools-0.2.5-0.7.i386.rpm
ia64: b646a3cc587fbc09f357fc034a023b50 ipsec-tools-0.2.5-0.7.ia64.rpm
ppc: 429e2466025454529bd6c5db6dac8463 ipsec-tools-0.2.5-0.7.ppc.rpm
s390: fbfda4852a54348abcd7d7e474195782 ipsec-tools-0.2.5-0.7.s390.rpm
s390x: 39fef41381e2bb472937ba83aaa956af ipsec-tools-0.2.5-0.7.s390x.rpm
x86_64: 4335033d7b3726c4ce1ff9a51747756a ipsec-tools-0.2.5-0.7.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: ipsec-tools-0.2.5-0.7.src.rpm 04fc5b942ed112aa3d8ecd3e6e527e87 ipsec-tools-0.2.5-0.7.src.rpm
i386: 55373f7613bd894b051137eca8c799fb ipsec-tools-0.2.5-0.7.i386.rpm
x86_64: 4335033d7b3726c4ce1ff9a51747756a ipsec-tools-0.2.5-0.7.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: ipsec-tools-0.2.5-0.7.src.rpm 04fc5b942ed112aa3d8ecd3e6e527e87 ipsec-tools-0.2.5-0.7.src.rpm
i386: 55373f7613bd894b051137eca8c799fb ipsec-tools-0.2.5-0.7.i386.rpm
ia64: b646a3cc587fbc09f357fc034a023b50 ipsec-tools-0.2.5-0.7.ia64.rpm
x86_64: 4335033d7b3726c4ce1ff9a51747756a ipsec-tools-0.2.5-0.7.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: ipsec-tools-0.2.5-0.7.src.rpm 04fc5b942ed112aa3d8ecd3e6e527e87 ipsec-tools-0.2.5-0.7.src.rpm
i386: 55373f7613bd894b051137eca8c799fb ipsec-tools-0.2.5-0.7.i386.rpm
ia64: b646a3cc587fbc09f357fc034a023b50 ipsec-tools-0.2.5-0.7.ia64.rpm
x86_64: 4335033d7b3726c4ce1ff9a51747756a ipsec-tools-0.2.5-0.7.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/ipsec-tools-0.3.3-6.src.rpm 6d465bb4084c165d8471ae457a1627d8 ipsec-tools-0.3.3-6.src.rpm
i386: 5e608be5a2d36e626451905cdca79252 ipsec-tools-0.3.3-6.i386.rpm
ia64: eb21e0073264ad7010a2b5a4e66538e9 ipsec-tools-0.3.3-6.ia64.rpm
ppc: f99ca70bb00a40ea4d4d5fc4397ad953 ipsec-tools-0.3.3-6.ppc.rpm
s390: f4d588f28fcdb8a543a556a0712ab627 ipsec-tools-0.3.3-6.s390.rpm
s390x: 4c65730a3848f3ac85db031c33de24a9 ipsec-tools-0.3.3-6.s390x.rpm
x86_64: 18fbd03935536494294326a7b1895ff6 ipsec-tools-0.3.3-6.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: ipsec-tools-0.3.3-6.src.rpm 6d465bb4084c165d8471ae457a1627d8 ipsec-tools-0.3.3-6.src.rpm
i386: 5e608be5a2d36e626451905cdca79252 ipsec-tools-0.3.3-6.i386.rpm
x86_64: 18fbd03935536494294326a7b1895ff6 ipsec-tools-0.3.3-6.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/ipsec-tools-0.3.3-6.src.rpm 6d465bb4084c165d8471ae457a1627d8 ipsec-tools-0.3.3-6.src.rpm
i386: 5e608be5a2d36e626451905cdca79252 ipsec-tools-0.3.3-6.i386.rpm
ia64: eb21e0073264ad7010a2b5a4e66538e9 ipsec-tools-0.3.3-6.ia64.rpm
x86_64: 18fbd03935536494294326a7b1895ff6 ipsec-tools-0.3.3-6.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/ipsec-tools-0.3.3-6.src.rpm 6d465bb4084c165d8471ae457a1627d8 ipsec-tools-0.3.3-6.src.rpm
i386: 5e608be5a2d36e626451905cdca79252 ipsec-tools-0.3.3-6.i386.rpm
ia64: eb21e0073264ad7010a2b5a4e66538e9 ipsec-tools-0.3.3-6.ia64.rpm
x86_64: 18fbd03935536494294326a7b1895ff6 ipsec-tools-0.3.3-6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0398
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFCQUDIXlSAg2UNWIIRAsSvAJ9RPtm7MOYA7lTWx3oyVWMwQ7L7vACgrVR0 8yxFngihwUZqrxi72MARFZk= =r8uT -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|