Mailinglist Archive: opensuse-updates (120 mails)

< Previous Next >
openSUSE-SU-2013:1646-1: - Applied upstream fix for a denial-of-service and authorization
openSUSE Security Update: - Applied upstream fix for a denial-of-service and
authorization
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1646-1
Rating: low
References: #847506
Cross-References: CVE-2013-6075
Affected Products:
openSUSE 12.3
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

- Applied upstream fix for a denial-of-service and
authorization bypass vulnerability via crafted ID payload
in strongswan 4.3.3 up to 5.1.0 (CVE-2013-6075,
bnc#847506).
[0005-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch]

- Added missed references to patch file 0003.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-826

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

strongswan-5.0.1-4.12.1
strongswan-debugsource-5.0.1-4.12.1
strongswan-ipsec-5.0.1-4.12.1
strongswan-ipsec-debuginfo-5.0.1-4.12.1
strongswan-libs0-5.0.1-4.12.1
strongswan-libs0-debuginfo-5.0.1-4.12.1
strongswan-mysql-5.0.1-4.12.1
strongswan-mysql-debuginfo-5.0.1-4.12.1
strongswan-nm-5.0.1-4.12.1
strongswan-nm-debuginfo-5.0.1-4.12.1
strongswan-sqlite-5.0.1-4.12.1
strongswan-sqlite-debuginfo-5.0.1-4.12.1

- openSUSE 12.3 (noarch):

strongswan-doc-5.0.1-4.12.1


References:

http://support.novell.com/security/cve/CVE-2013-6075.html
https://bugzilla.novell.com/847506


< Previous Next >
This Thread
  • No further messages