-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- --------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Moderate: ipsec-tools security update Advisory ID: RHSA-2006:0267-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0267.html Issue date: 2006-04-25 Updated on: 2006-04-25 Product: Red Hat Enterprise Linux CVE Names: CVE-2005-3732 - ---------------------------------------------------------------------
1. Summary:
Updated ipsec-tools packages that fix a bug in racoon are now available.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
3. Problem description:
The ipsec-tools package is used in conjunction with the IPsec functionality in the linux kernel and includes racoon, an IKEv1 keying daemon.
A denial of service flaw was found in the ipsec-tools racoon daemon. If a victim's machine has racoon configured in a non-recommended insecure manner, it is possible for a remote attacker to crash the racoon daemon. (CVE-2005-3732)
Users of ipsec-tools should upgrade to these updated packages, which contain backported patches, and are not vulnerable to these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
173841 - CVE-2005-3732 ipsec-tools IKE DoS 181605 - CVE-2005-3732 ipsec-tools IKE DoS
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS: ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
ppc: eb22e79ec0ccb8e546b612749963f5ee ipsec-tools-0.2.5-0.7.rhel3.3.ppc.rpm 64f2341c9e12c8656597d4725b4412ab ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ppc.rpm
s390: 7e20191320ddf9d230b75a8f63fe315e ipsec-tools-0.2.5-0.7.rhel3.3.s390.rpm aba15779dc0e46dc06346f7981fd2c20 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390.rpm
s390x: 93892dbdb5c9d0d85ca65c6651655b19 ipsec-tools-0.2.5-0.7.rhel3.3.s390x.rpm 420c85900139807b487e65ccbd706979 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.s390x.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm 947910c457600879145e041862e0bcb0 ipsec-tools-0.2.5-0.7.rhel3.3.src.rpm
i386: dbbb9bcc93832b082f98f9a1964ac0a3 ipsec-tools-0.2.5-0.7.rhel3.3.i386.rpm ed7064025214d5de74c387b288720f92 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.i386.rpm
ia64: 6c97ef7c2dfea1f077c37d3065645495 ipsec-tools-0.2.5-0.7.rhel3.3.ia64.rpm 10c71e7b356cc56b70091ca8a92e4cc2 ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.ia64.rpm
x86_64: fb8b6c328d33ff990a016cd93f5b5c2e ipsec-tools-0.2.5-0.7.rhel3.3.x86_64.rpm 8a342679a07240c4d8536cb5a24f3aee ipsec-tools-debuginfo-0.2.5-0.7.rhel3.3.x86_64.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
ppc: fb37df4b25abdda16d46e9ba78bf916c ipsec-tools-0.3.3-6.rhel4.1.ppc.rpm 3e902ab84f03bcac0ee430bc26da46df ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ppc.rpm
s390: 3bf00b8901eeb2a04f75d532ca3f4650 ipsec-tools-0.3.3-6.rhel4.1.s390.rpm 11b52a9258966efc8680382b2dc7c95b ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390.rpm
s390x: 09de8693ab709c025a4cbf5d5b7acde3 ipsec-tools-0.3.3-6.rhel4.1.s390x.rpm ad6c1dfc0a80088c2b469942bc8e7413 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.s390x.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: ipsec-tools-0.3.3-6.rhel4.1.src.rpm aed36ce0deb098bda284977fa2f9af04 ipsec-tools-0.3.3-6.rhel4.1.src.rpm
i386: af514b3e19ce362c30f42c072751ca7c ipsec-tools-0.3.3-6.rhel4.1.i386.rpm 5c38272ecadfdb30d398f5261888d358 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.i386.rpm
ia64: 2f9fbde3de938d4f1ec7c437fb6c91e7 ipsec-tools-0.3.3-6.rhel4.1.ia64.rpm d2d09077ed0ab1823eb5e1c511b530e5 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.ia64.rpm
x86_64: 7db930f40bb68f77de42997f4b43cff6 ipsec-tools-0.3.3-6.rhel4.1.x86_64.rpm d43078b66bfb23feb80355b99568b2c2 ipsec-tools-debuginfo-0.3.3-6.rhel4.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732 forum.php?thread_id=9017454&forum_id=32000 http://www.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2006 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFETjeIXlSAg2UNWIIRAooXAKCqNSdkBBYzZEMkO4HXZjlLwqMLDwCeNEY4 vpG91XKClEQ5ZH9vTtUmOnQ= =OeOO -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|