Hash: SHA1
- ---------------------------------------------------------------------------
Debian Security Advisory DSA 1299-1 security@debian.org
http://www.debian.org/security/
dann frazier
June 7th, 2007
http://www.debian.org/security/faq
- ---------------------------------------------------------------------------
Package : ipsec-tools
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CVE-2007-2524
It was discovered that a specially-crafted packet sent to the racoon
ipsec key exchange server could cause a tunnel to crash, resulting in
a denial of service.
The oldstable distribution (sarge) isn't affected by this problem.
For the stable distribution (etch) this problem has been fixed in
version 1:0.6.6-3.1.
The unstable distribution (sid) will be fixed soon.
We recommend that you upgrade your racoon package.
Upgrade Instructions
- ---------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.dsc
Size/MD5 checksum: 714 8b0036099ce66a7cbe83e54d0b904af2
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.diff.gz
Size/MD5 checksum: 49981 087edd1d11957b09b2171900a9b11861
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6.orig.tar.gz
Size/MD5 checksum: 914807 643a238e17148d242c603c511e28d029
Alpha architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_alpha.deb
Size/MD5 checksum: 97060 2532ce5a61a9ddda86d2dc2b6c2fee0d
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_alpha.deb
Size/MD5 checksum: 376370 d20d19e5fa8943b80a1a5678044e578c
AMD64 architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_amd64.deb
Size/MD5 checksum: 89052 8ff0a34a1fca0e232edcee6827233760
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_amd64.deb
Size/MD5 checksum: 341854 44f25a0b80eb783aa1c8f6a971ca237d
ARM architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_arm.deb
Size/MD5 checksum: 89788 d5378073f43820e820d5abfab4ea19ac
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_arm.deb
Size/MD5 checksum: 325002 fc60192e280377c8d802827fb35e9ccf
HP Precision architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_hppa.deb
Size/MD5 checksum: 93882 6a44a4a6f99bd607c47b993eb02ede0a
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_hppa.deb
Size/MD5 checksum: 354128 130b95fb7d817148acc080b87d650033
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_i386.deb
Size/MD5 checksum: 84608 a5ae0d2e2a6c804a7bc28bd78b89b9a8
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_i386.deb
Size/MD5 checksum: 329946 ecf6c9f4b86fa32b24ef7d395ec786bc
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_ia64.deb
Size/MD5 checksum: 113136 8bda8ebe0253f6a122ed55ae5594061c
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_ia64.deb
Size/MD5 checksum: 467976 f10fd34a1511d2115429a07aa66c9505
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mips.deb
Size/MD5 checksum: 89766 66e65d7dd8997376ec87419b9e578635
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mips.deb
Size/MD5 checksum: 344828 091f455c5364c6e086ccf3bab88b118d
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mipsel.deb
Size/MD5 checksum: 90078 23c815af2dd3b8caafbf51a36cc10f7e
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mipsel.deb
Size/MD5 checksum: 346628 c31717b5c9d124fb762dd6bff3f05179
PowerPC architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_powerpc.deb
Size/MD5 checksum: 90846 a90d219725f00bb471e50b959dba126a
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_powerpc.deb
Size/MD5 checksum: 336966 cfe0376c21ac35af5ece94222a4d1642
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_s390.deb
Size/MD5 checksum: 90524 d51eafa7b1a6148c3cf81bfbe9dd512e
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_s390.deb
Size/MD5 checksum: 341322 888ca59e56b0aec906d7e1dfb854c2f9
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_sparc.deb
Size/MD5 checksum: 85938 57cff108c12ce7b3783a7e905e8afceb
http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_sparc.deb
Size/MD5 checksum: 318274 c2f8458fa25cd0b0b1857bcd3a6d827b
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------- iD8DBQFGaEU7huANDBmkLRkRAtVOAJ9G5dNX9JyzklUMCxCpcCPJ5frr8wCdH9U5
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
6q7ng9jVMSwJEDZBjT7ykKw=
=AF46
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
No comments:
Post a Comment