openSUSE Security Update: strongswan: fixing snprintf overflows ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0496-1 Rating: important References: #615915 Cross-References: CVE-2010-2628 Affected Products: openSUSE 11.3 openSUSE 11.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Remote unauthenticated attackers could cause a buffer overflow in strongswan's IKE deamon by using specially crafted certificates or identify information. Attackers could potentially exploit that to execute code (CVE-2010-2628). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch strongswan-2855 - openSUSE 11.2: zypper in -t patch strongswan-2855 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 src x86_64): strongswan-4.4.0-4.1.1 - openSUSE 11.3 (i586 x86_64): strongswan-doc-4.4.0-4.1.1 strongswan-ikev1-4.4.0-4.1.1 strongswan-ikev2-4.4.0-4.1.1 strongswan-ipsec-4.4.0-4.1.1 strongswan-libs0-4.4.0-4.1.1 strongswan-nm-4.4.0-4.1.1 - openSUSE 11.2 (i586 src x86_64): strongswan-4.3.4-4.4.1 - openSUSE 11.2 (i586 x86_64): strongswan-doc-4.3.4-4.4.1 References: http://support.novell.com/security/cve/CVE-2010-2628.html https://bugzilla.novell.com/615915