First published: Fri Jul 25 2008(Updated: )
ipsec-tools upstream released 0.7.1 including a fix for a memory leak in racoon daemon triggered by the invalid proposals, possibly resulting in a denial of service once daemon runs out of memory. References: <a href="http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2">http://marc.info/?l=ipsec-tools-devel&m=121688914101709&w=2</a> <a href="http://bugs.gentoo.org/show_bug.cgi?id=232831">http://bugs.gentoo.org/show_bug.cgi?id=232831</a> Upstream patch: <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/proposal.c.diff?r1=1.15&r2=1.16&f=h">http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/proposal.c.diff?r1=1.15&r2=1.16&f=h</a> <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/ChangeLog.diff?r1=1.169&r2=1.170&f=h">http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/ChangeLog.diff?r1=1.169&r2=1.170&f=h</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ipsec-tools |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-456660 is critical due to the potential denial of service caused by the memory leak.
To fix REDHAT-BUG-456660, upgrade to ipsec-tools version 0.7.1 or later where the memory leak issue has been resolved.
Failing to address REDHAT-BUG-456660 can lead to a denial of service as the racoon daemon runs out of memory.
The vulnerability REDHAT-BUG-456660 affects applications using the ipsec-tools package, particularly the racoon daemon.
Currently, there are no known workarounds for REDHAT-BUG-456660; the best resolution is to upgrade the software.