Gentoo Archives: gentoo-commits

From: "Robert Buchholz (rbu)" <rbu@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-200812-03.xml
Date: Tue, 02 Dec 2008 17:35:07
Message-Id: E1L7Z9M-0005DQ-R3@stork.gentoo.org
1 rbu 08/12/02 17:35:04
2
3 Added: glsa-200812-03.xml
4 Log:
5 GLSA 200812-03
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-200812-03.xml
9
10 file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200812-03.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/security/en/glsa/glsa-200812-03.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-200812-03.xml
14 ===================================================================
15 <?xml version="1.0" encoding="utf-8"?>
16 <?xml-stylesheet href="/xsl/glsa.xsl" type="text/xsl"?>
17 <?xml-stylesheet href="/xsl/guide.xsl" type="text/xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19
20 <glsa id="200812-03">
21 <title>IPsec-Tools: racoon Denial of Service</title>
22 <synopsis>
23 IPsec-Tools' racoon is affected by a remote Denial of Service
24 vulnerability.
25 </synopsis>
26 <product type="ebuild">ipsec-tools</product>
27 <announced>December 02, 2008</announced>
28 <revised>December 02, 2008: 01</revised>
29 <bug>232831</bug>
30 <access>remote</access>
31 <affected>
32 <package name="net-firewall/ipsec-tools" auto="yes" arch="*">
33 <unaffected range="ge">0.7.1</unaffected>
34 <vulnerable range="lt">0.7.1</vulnerable>
35 </package>
36 </affected>
37 <background>
38 <p>
39 IPsec-Tools is a port of KAME's implementation of the IPsec utilities.
40 It contains a collection of network monitoring tools, including racoon,
41 ping, and ping6.
42 </p>
43 </background>
44 <description>
45 <p>
46 Two Denial of Service vulnerabilities have been reported in racoon:
47 </p>
48 <ul>
49 <li>
50 The vendor reported a memory leak in racoon/proposal.c that can be
51 triggered via invalid proposals (CVE-2008-3651).
52 </li>
53 <li>
54 Krzysztof Piotr Oledzk reported that src/racoon/handler.c does not
55 remove an "orphaned ph1" (phase 1) handle when it has been initiated
56 remotely (CVE-2008-3652).
57 </li>
58 </ul>
59 </description>
60 <impact type="normal">
61 <p>
62 An attacker could exploit these vulnerabilities to cause a Denial of
63 Service.
64 </p>
65 </impact>
66 <workaround>
67 <p>
68 There is no known workaround at this time.
69 </p>
70 </workaround>
71 <resolution>
72 <p>
73 All IPsec-Tools users should upgrade to the latest version:
74 </p>
75 <code>
76 # emerge --sync
77 # emerge --ask --oneshot --verbose &quot;&gt;=net-firewall/ipsec-tools-0.7.1&quot;</code>
78 </resolution>
79 <references>
80 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651">CVE-2008-3651</uri>
81 <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652">CVE-2008-3652</uri>
82 </references>
83 <metadata tag="requester" timestamp="Wed, 26 Nov 2008 18:44:35 +0000">
84 rbu
85 </metadata>
86 <metadata tag="submitter" timestamp="Wed, 26 Nov 2008 20:25:15 +0000">
87 rbu
88 </metadata>
89 <metadata tag="bugReady" timestamp="Wed, 26 Nov 2008 20:25:48 +0000">
90 rbu
91 </metadata>
92 </glsa>