Mailinglist Archive: opensuse-updates (72 mails)

< Previous Next >
openSUSE-SU-2010:0496-1 (important): strongswan: fixing snprintf overflows
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Tue, 10 Aug 2010 04:08:15 +0200 (CEST)
  • Message-id: <20100810020815.B6491BE29@xxxxxxxxxxxxxx>
openSUSE Security Update: strongswan: fixing snprintf overflows
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0496-1
Rating: important
References: #615915
Cross-References: CVE-2010-2628
Affected Products:
openSUSE 11.3
openSUSE 11.2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

Remote unauthenticated attackers could cause a buffer
overflow in strongswan's IKE deamon by using specially
crafted certificates or identify information. Attackers
could potentially exploit that to execute code
(CVE-2010-2628).


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch strongswan-2855

- openSUSE 11.2:

zypper in -t patch strongswan-2855

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 src x86_64):

strongswan-4.4.0-4.1.1

- openSUSE 11.3 (i586 x86_64):

strongswan-doc-4.4.0-4.1.1
strongswan-ikev1-4.4.0-4.1.1
strongswan-ikev2-4.4.0-4.1.1
strongswan-ipsec-4.4.0-4.1.1
strongswan-libs0-4.4.0-4.1.1
strongswan-nm-4.4.0-4.1.1

- openSUSE 11.2 (i586 src x86_64):

strongswan-4.3.4-4.4.1

- openSUSE 11.2 (i586 x86_64):

strongswan-doc-4.3.4-4.4.1


References:

http://support.novell.com/security/cve/CVE-2010-2628.html
https://bugzilla.novell.com/615915


< Previous Next >
This Thread
  • No further messages