Skip to navigation

Bug Fix Advisory ipsec-tools bug fix update

Advisory: RHBA-2012:1249-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-09-11
Last updated on: 2012-09-11
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ipsec-tools packages that fix two bugs is now available for Red Hat
Enterprise Linux 5.

The ipsec-tools packages contain configuration and management tools for the
IPsec protocol.

This update fixes the following bugs:

* Under certain circumstances, the racoon daemon terminated unexpectedly due to
referencing a NULL pointer when writing to the system log. The update ensures
that the NULL pointer is never referenced by racoon in this scenario, thus
fixing this bug. (BZ#852735)

* When using the setkey command to dump the pfkey database, the setkey command
could decrease the size of a kernel buffer that is used to send the data.
Consequently, the dumped database was incomplete and the operation failed with
an error in the recv() function. With this update, setkey never decreases the
kernel buffer size, thus preventing this bug. (BZ#852734)

All users of ipsec-tools are advised to upgrade to these updated package, which
fix these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ipsec-tools-0.6.5-14.el5_8.5.src.rpm     MD5: 46e076d852ae6e3dfe1848e4ba5192b2
SHA-256: 2aa0345acb55d6cbf479039a2c93802c862f391de135e11aaca0aa0f4935ec5f
 
IA-32:
ipsec-tools-0.6.5-14.el5_8.5.i386.rpm     MD5: 0a26fe1f1b298677de49edf1e2551a59
SHA-256: fc332a6ea5efa5cf75a64981b8eba3fa7209cda015b1dd39c8ec0346642ff5dc
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.i386.rpm     MD5: c7afeec2c73dfb8adf68364d703173c1
SHA-256: 3752539a2a2318e2a89408c90a8a92deb89ca962b61d80dbc6359815500ca8f5
 
IA-64:
ipsec-tools-0.6.5-14.el5_8.5.ia64.rpm     MD5: da57f3f3b762b755458191af87aa3c06
SHA-256: 9c59dd72657128854be4d9d1f8b3b11e2516798739b73e98128bf98c5c54adcc
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.ia64.rpm     MD5: 287510e5f3dd1d08ca433a21e25890f4
SHA-256: 663ed1cdbccf793ae9eb9a6bb65375092a048547406fb501f57464202b21d20f
 
PPC:
ipsec-tools-0.6.5-14.el5_8.5.ppc.rpm     MD5: 07227cf2061dfca3bc43cdb6b756fb6b
SHA-256: 925d05ca9dc11c59d7a4cb86ab166189faac58935cf516650ef41eebe3d5ac9c
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.ppc.rpm     MD5: 76fb4340994f64e155be579eb89f60a5
SHA-256: f4b0386864c0333283f9c00a401bf8b40837dc504180f0d32ed7a818467d9cd8
 
s390x:
ipsec-tools-0.6.5-14.el5_8.5.s390x.rpm     MD5: cc8e6ce42457b4d835a1fc546333e4da
SHA-256: 813ac040d00fb0972ff682dd7a6aa613b9569b49cbe7168eaee23a6d6288e224
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.s390x.rpm     MD5: 4e9c48eb44f44ee5702b933d1274bd95
SHA-256: 9b6dbdd811e24983a64cb1b3ea7f8286434958615063125a535daa9df8d194b7
 
x86_64:
ipsec-tools-0.6.5-14.el5_8.5.x86_64.rpm     MD5: 8b5815de22744833e75e5acfb393d325
SHA-256: be99407b20365528ea68443fae56c366150c342d8aeb0a0fcda8a2da8c93f9ce
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.x86_64.rpm     MD5: 0afdf87b850c252d831377b39c65ecd9
SHA-256: 39cc347cdf90be048ef2390961a13a0aa377283ca0052b99e75e255d7834d453
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ipsec-tools-0.6.5-14.el5_8.5.src.rpm     MD5: 46e076d852ae6e3dfe1848e4ba5192b2
SHA-256: 2aa0345acb55d6cbf479039a2c93802c862f391de135e11aaca0aa0f4935ec5f
 
IA-32:
ipsec-tools-0.6.5-14.el5_8.5.i386.rpm     MD5: 0a26fe1f1b298677de49edf1e2551a59
SHA-256: fc332a6ea5efa5cf75a64981b8eba3fa7209cda015b1dd39c8ec0346642ff5dc
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.i386.rpm     MD5: c7afeec2c73dfb8adf68364d703173c1
SHA-256: 3752539a2a2318e2a89408c90a8a92deb89ca962b61d80dbc6359815500ca8f5
 
x86_64:
ipsec-tools-0.6.5-14.el5_8.5.x86_64.rpm     MD5: 8b5815de22744833e75e5acfb393d325
SHA-256: be99407b20365528ea68443fae56c366150c342d8aeb0a0fcda8a2da8c93f9ce
ipsec-tools-debuginfo-0.6.5-14.el5_8.5.x86_64.rpm     MD5: 0afdf87b850c252d831377b39c65ecd9
SHA-256: 39cc347cdf90be048ef2390961a13a0aa377283ca0052b99e75e255d7834d453
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

buffer, crash, pfkey, plog


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/