openSUSE-SU-2013:1646-1: - Applied upstream fix for a denial-of-service and authorization
openSUSE Security Update: - Applied upstream fix for a denial-of-service and authorization ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:1646-1 Rating: low References: #847506 Cross-References: CVE-2013-6075 Affected Products: openSUSE 12.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: - Applied upstream fix for a denial-of-service and authorization bypass vulnerability via crafted ID payload in strongswan 4.3.3 up to 5.1.0 (CVE-2013-6075, bnc#847506). [0005-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch] - Added missed references to patch file 0003. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.3: zypper in -t patch openSUSE-2013-826 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.3 (i586 x86_64): strongswan-5.0.1-4.12.1 strongswan-debugsource-5.0.1-4.12.1 strongswan-ipsec-5.0.1-4.12.1 strongswan-ipsec-debuginfo-5.0.1-4.12.1 strongswan-libs0-5.0.1-4.12.1 strongswan-libs0-debuginfo-5.0.1-4.12.1 strongswan-mysql-5.0.1-4.12.1 strongswan-mysql-debuginfo-5.0.1-4.12.1 strongswan-nm-5.0.1-4.12.1 strongswan-nm-debuginfo-5.0.1-4.12.1 strongswan-sqlite-5.0.1-4.12.1 strongswan-sqlite-debuginfo-5.0.1-4.12.1 - openSUSE 12.3 (noarch): strongswan-doc-5.0.1-4.12.1 References: http://support.novell.com/security/cve/CVE-2013-6075.html https://bugzilla.novell.com/847506
participants (1)
-
opensuse-security@opensuse.org