=========================================================== 
Ubuntu Security Notice USN-641-1         September 09, 2008
ipsec-tools vulnerabilities
CVE-2008-3651, CVE-2008-3652
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  racoon                          1:0.6.5-4ubuntu1.2

Ubuntu 7.04:
  racoon                          1:0.6.6-3ubuntu3.1

Ubuntu 7.10:
  racoon                          1:0.6.6-3.1ubuntu3.1

Ubuntu 8.04 LTS:
  racoon                          1:0.6.7-1.1ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that there were multiple ways to leak memory during
the IKE negotiation when handling certain packets.  If a remote attacker
sent repeated malicious requests, the "racoon" key exchange server could
allocate large amounts of memory, possibly leading to a denial of service.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

          Size/MD5:    47976 6638ae6b7edc7671f77af5b93763de0d
          Size/MD5:      750 7d87380c510f48a35da9333fbfaf6629
          Size/MD5:   914466 168076243c023782d3fb44a583d4a32c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:    89430 2750ab4633d8ae447bed5aa7971aba48
          Size/MD5:   342540 912a807165c43ce90d3c60cc211ec94b

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:    82876 5958ed679926590d81b53ecf8c651331
          Size/MD5:   311398 ef1a597a39f3ee88292364b037452395

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:    91124 e140993179e7d7187574bf971d6773f5
          Size/MD5:   336876 9bfa3bb9da23913f4ca6161a0acc602f

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:    86632 210608ca3d4990fb54566f6d4b3942c8
          Size/MD5:   316756 ad7f2ccefd4f35cb8aaf5980e53a9499

Updated packages for Ubuntu 7.04:

  Source archives:

          Size/MD5:    51311 51c0a08c38483a47bd3b2d8a73e1287f
          Size/MD5:      848 50817196a867ed407f0c67f928bc2260
          Size/MD5:   914807 643a238e17148d242c603c511e28d029

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:    91284 1780bae1fe5fdb3b907c39a876a2c419
          Size/MD5:   345490 cb1610211a35a5a4f8d27b962e67830b

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:    85700 eb95ead40564cd0965a6c256cc29cda4
          Size/MD5:   321292 338faec788865311b18ffe8aa9424ae5

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:    95646 0b6ce9437e4255922de2ed241730aa73
          Size/MD5:   347712 b7eadf3051881ee5d184aa93e0bc7f8e

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:    89750 e47a17747bf516f28ba30b71ab762df4
          Size/MD5:   323440 617461a267909d50f6d0994b03f55688

Updated packages for Ubuntu 7.10:

  Source archives:

          Size/MD5:    54744 118e0b2e21e6fd42e7b153212f9d7847
          Size/MD5:      852 754c5e79157f7161d03323206c402c90
          Size/MD5:   914807 643a238e17148d242c603c511e28d029

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:    91780 cdeda0b4689c7051074ccfbf7757ca5b
          Size/MD5:   348172 07a71cb07b5edc9e805c716b6bdc7374

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:    86050 2224517ec375bdf2d55ddeea1afcd8bb
          Size/MD5:   323010 919ef460216ef536459dd21b50483b07

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:    86698 cf26821405e282cd0c158bef83ba75ca
          Size/MD5:   323408 878b1d8f4c31dd4139e4ea14e4b9fefc

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:    96036 037e835bb80cb35c792dce96168e502f
          Size/MD5:   349582 3d53de0ac8a3fcf27c8a28234c363099

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:    90208 7e6ae9b61a59731e5edf759da59b6443
          Size/MD5:   325398 ed029d3727b0abb6dfc5718661d3179f

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

          Size/MD5:   263295 c9592c8529b56ee3d6b40a1e3745b4c2
          Size/MD5:      865 e7183e67f50caf1a396570bf7a4f1e89
          Size/MD5:   933322 e9f38f6f12124b9c19da684c87db9fcf

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:    91902 412eee43832542bdb31e47a8eec55a4b
          Size/MD5:   349030 bc73017cf4999c7e5f26218ef2e1e8a5

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:    86470 3496a2a6e102a029364642c5a02d49ea
          Size/MD5:   324144 456c9da0a86535481406445d7e0a3e18

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:    86776 eafd43eda682ca7a99c3dcff763ea430
          Size/MD5:   324314 9349d9ecfb37919ac5caf4f841215a63

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:    96006 d4195e7f700808a98fb4f79c9e3fd0a9
          Size/MD5:   350830 eaa04a1b7456ec1ddf95c133aee9e2c8

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:    91072 f917354fcfa265bf5c008edea716e0ce
          Size/MD5:   325378 4940622cdeaf063c76b9e090987d5e89


Ubuntu: Racoon vulnerabilities

September 8, 2008
It was discovered that there were multiple ways to leak memory during the IKE negotiation when handling certain packets

Summary

Update Instructions

References

Severity
Ubuntu Security Notice USN-641-1 September 09, 2008

Package Information

Related News