Hello community,
here is the log from the commit of package strongswan for openSUSE:Factory
checked in at Sun Jun 7 23:01:00 CEST 2009.
--------
--- strongswan/strongswan.changes 2009-03-31 17:21:40.000000000 +0200
+++ /mounts/work_src_done/STABLE/strongswan/strongswan.changes 2009-06-02 11:20:06.000000000 +0200
@@ -1,0 +2,14 @@
+Tue Jun 2 09:56:16 CEST 2009 - mt@suse.de
+
+- Applied fix for a Denial-of-Service vulnerability where receiving
+ a malformed IKE_SA_INIT request leaves an incomplete state which
+ causes a crash of the IKEv2 charon while dereferencing a NULL
+ pointer if a subsequent CREATE_CHILD_SA is received (bnc#507742).
+- Applied fix for a Denial-of-Service vulnerability where receiving
+ a malformed IKE_AUTH request with either a missing TSi or TSr
+ traffic selector payload causes a crash of the IKEv2 charon while
+ dereferencing a NULL pointer because the NULL pointer checks of
+ TSi and TSr before destruction were erroneously swapped
+ (bnc#507742).
+
+-------------------------------------------------------------------
calling whatdependson for head-i586
New:
----
strongswan-4.x.x_invalid_ike_state.patch
strongswan-4.x.x._swapped_ts_check.patch
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ strongswan.spec ++++++
--- /var/tmp/diff_new_pack.D21360/_old 2009-06-07 22:59:45.000000000 +0200
+++ /var/tmp/diff_new_pack.D21360/_new 2009-06-07 22:59:45.000000000 +0200
@@ -22,7 +22,7 @@
%define upstream_version 4.2.14
%define strongswan_docdir %{_docdir}/%{name}
Version: 4.2.14
-Release: 1
+Release: 2
License: GPL v2 or later
Group: Productivity/Networking/Security
Summary: StrongSwan -- OpenSource IPsec-based VPN Solution
@@ -39,6 +39,8 @@
Source3: %{name}-%{version}-rpmlintrc
Patch1: %{name}_modprobe_syslog.dif
Patch2: %{name}_update-dns-server.dif
+Patch3: %{name}-4.x.x_invalid_ike_state.patch
+Patch4: %{name}-4.x.x._swapped_ts_check.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: bison flex gmp-devel gperf pkg-config
%if 0%{?suse_version} >= 1030
@@ -135,6 +137,8 @@
%setup -q -n %{name}-%{upstream_version}
%patch1 -p0
%patch2 -p0
+%patch3 -p1
+%patch4 -p1
sed -e 's|@libexecdir@|%_libexecdir|g' \
< $RPM_SOURCE_DIR/strongswan.init.in \
> strongswan.init
@@ -267,6 +271,17 @@
%{_mandir}/man8/starter.8*
%changelog
+* Tue Jun 02 2009 mt@suse.de
+- Applied fix for a Denial-of-Service vulnerability where receiving
+ a malformed IKE_SA_INIT request leaves an incomplete state which
+ causes a crash of the IKEv2 charon while dereferencing a NULL
+ pointer if a subsequent CREATE_CHILD_SA is received (bnc#507742).
+- Applied fix for a Denial-of-Service vulnerability where receiving
+ a malformed IKE_AUTH request with either a missing TSi or TSr
+ traffic selector payload causes a crash of the IKEv2 charon while
+ dereferencing a NULL pointer because the NULL pointer checks of
+ TSi and TSr before destruction were erroneously swapped
+ (bnc#507742).
* Tue Mar 31 2009 mt@suse.de
- Updated to strongSwan 4.2.14 release that fixes a grave DPD
denial of service vulnerability registered as CVE-2009-0790,
++++++ strongswan-4.x.x_invalid_ike_state.patch ++++++
commit a627e31f463367d83be5814aff8ddbceb725f4ed
Author: Martin Willi