openSUSE Security Update: update for strongswan ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:1651-1 Rating: low References: #840826 #847506 Cross-References: CVE-2013-6075 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: - Applied upstream fix for a denial-of-service and authorization bypass vulnerability via crafted ID payload in strongswan 4.3.3 up to 5.1.0 (CVE-2013-6075, bnc#847506). [0007-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch] - Added a recursion limit to get_route in netlink plugin to avoid a charon crash while trying to find a source address when local left is set to %any on newer kernels sorting the default route as first one (bnc#840826). [0006-strongswan-4.6.4-bnc-840826-recursion-limit.patch] Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2013-158 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): strongswan-4.5.0-6.60.1 strongswan-debugsource-4.5.0-6.60.1 strongswan-doc-4.5.0-6.60.1 strongswan-ikev1-4.5.0-6.60.1 strongswan-ikev1-debuginfo-4.5.0-6.60.1 strongswan-ikev2-4.5.0-6.60.1 strongswan-ikev2-debuginfo-4.5.0-6.60.1 strongswan-ipsec-4.5.0-6.60.1 strongswan-ipsec-debuginfo-4.5.0-6.60.1 strongswan-libs0-4.5.0-6.60.1 strongswan-libs0-debuginfo-4.5.0-6.60.1 strongswan-mysql-4.5.0-6.60.1 strongswan-mysql-debuginfo-4.5.0-6.60.1 strongswan-nm-4.5.0-6.60.1 strongswan-nm-debuginfo-4.5.0-6.60.1 strongswan-sqlite-4.5.0-6.60.1 strongswan-sqlite-debuginfo-4.5.0-6.60.1 References: http://support.novell.com/security/cve/CVE-2013-6075.html https://bugzilla.novell.com/840826 https://bugzilla.novell.com/847506