Bug 126568

Summary: CAN-2004-0607 racoon authentication bug
Product: Red Hat Enterprise Linux 3 Reporter: Mark J. Cox <mjc>
Component: ipsec-toolsAssignee: Bill Nottingham <notting>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: bressers, rvokal
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://marc.theaimsgroup.com/?l=bugtraq&m=108726102304507
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2004-07-29 19:11:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark J. Cox 2004-06-23 12:11:42 UTC
Reported to bugtraq on Jun15 an issue that affects all versions of
racoon due to the poor verification of x509 certificates in the
OpenSSL callback. See:

        http://marc.theaimsgroup.com/?l=bugtraq&m=108726102304507
        http://marc.theaimsgroup.com/?l=bugtraq&m=108731967126033

This is fixed in 0.3.3 by splitting the callback; this fix will need
backported to 0.2.2 as shipped with RHEL3.

        Affects: 3AS 3WS 3ES 3Desktop

Comment 2 Mark J. Cox 2004-07-29 19:11:38 UTC
An errata has been issued which should help the problem 
described in this bug report. This report is therefore being 
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, 
please follow the link below. You may reopen this bug report 
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2004-308.html