[SRU] NetBSD CVE Patch Regression
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ipsec-tools (Ubuntu) |
Invalid
|
Medium
|
Unassigned | ||
Bionic |
Triaged
|
Low
|
Unassigned | ||
Disco |
Won't Fix
|
Low
|
Unassigned |
Bug Description
[Impact]
TBD
[Test Case]
TBD
[Regression Potential]
[Fix]
[Discussion]
[Original Report]
After upgrade racoon from 1:0.8.2+20140711-5 to 1:0.8.2+
Sep 14 06:42:28 vpnserver racoon[1775]: ERROR: Repeated fragment index mismatch
Sep 14 06:42:28 vpnserver racoon[1775]: ERROR: Repeated last fragment index mismatch
Sep 14 06:42:32 vpnserver racoon[1775]: ERROR: Repeated fragment index mismatch
Sep 14 06:42:32 vpnserver racoon[1775]: ERROR: Repeated last fragment index mismatch
Sep 14 06:42:35 vpnserver racoon[1775]: ERROR: Repeated fragment index mismatch
Sep 14 06:42:35 vpnserver racoon[1775]: ERROR: Repeated last fragment index mismatch
Sep 14 06:42:35 vpnserver racoon[1775]: ERROR: Repeated fragment index mismatch
Sep 14 06:42:35 vpnserver racoon[1775]: ERROR: Repeated last fragment index mismatch
Sep 14 06:42:39 vpnserver racoon[1775]: ERROR: phase1 negotiation failed due to time up.
A brief check of the upstream activities shows, that maintainers switched to panic mode because of CVE-2016-10396 and provided a rough patch without support of the ipsec-tools project and without the ability to perform sufficient regression tests.
As Debian as well as NetBSD maintainers already have expressed their general concerns about this patch, there really seems to be a severe issue.
Further evidences can be provided but as the topic is pretty complicated detailed guidance is required.
CVE References
tags: | added: server-next |
Changed in ipsec-tools (Ubuntu): | |
status: | Incomplete → Triaged |
importance: | Undecided → Medium |
Changed in ipsec-tools (Debian): | |
status: | Unknown → Fix Released |
tags: |
added: regression-release removed: regression-update |
affects: | ipsec-tools (Debian) → debian |
Changed in debian: | |
importance: | Unknown → Undecided |
status: | Fix Released → New |
affects: | debian → ubuntu |
no longer affects: | ubuntu |
summary: |
- NetBSD CVE Patch Regression + [SRU] NetBSD CVE Patch Regression |
description: | updated |
Changed in ipsec-tools (Ubuntu Disco): | |
status: | Triaged → Won't Fix |
I've stored a "patched" package in Ubuntu launchpad that fixes this issue but again contains vulnerability CVE-2016-10396.
https:/ /launchpad. net/~rdratlos/ +archive/ ubuntu/ racoon