Mailinglist Archive: opensuse-updates (120 mails)

< Previous Next >
openSUSE-SU-2013:1651-1: update for strongswan
openSUSE Security Update: update for strongswan
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1651-1
Rating: low
References: #840826 #847506
Cross-References: CVE-2013-6075
Affected Products:
openSUSE 11.4
______________________________________________________________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

- Applied upstream fix for a denial-of-service and
authorization bypass vulnerability via crafted ID payload
in strongswan 4.3.3 up to 5.1.0 (CVE-2013-6075,
bnc#847506).
[0007-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch]

- Added a recursion limit to get_route in netlink plugin to
avoid a charon crash while trying to find a source
address when local left is set to %any on newer kernels
sorting the default route as first one (bnc#840826).
[0006-strongswan-4.6.4-bnc-840826-recursion-limit.patch]


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.4:

zypper in -t patch 2013-158

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.4 (i586 x86_64):

strongswan-4.5.0-6.60.1
strongswan-debugsource-4.5.0-6.60.1
strongswan-doc-4.5.0-6.60.1
strongswan-ikev1-4.5.0-6.60.1
strongswan-ikev1-debuginfo-4.5.0-6.60.1
strongswan-ikev2-4.5.0-6.60.1
strongswan-ikev2-debuginfo-4.5.0-6.60.1
strongswan-ipsec-4.5.0-6.60.1
strongswan-ipsec-debuginfo-4.5.0-6.60.1
strongswan-libs0-4.5.0-6.60.1
strongswan-libs0-debuginfo-4.5.0-6.60.1
strongswan-mysql-4.5.0-6.60.1
strongswan-mysql-debuginfo-4.5.0-6.60.1
strongswan-nm-4.5.0-6.60.1
strongswan-nm-debuginfo-4.5.0-6.60.1
strongswan-sqlite-4.5.0-6.60.1
strongswan-sqlite-debuginfo-4.5.0-6.60.1


References:

http://support.novell.com/security/cve/CVE-2013-6075.html
https://bugzilla.novell.com/840826
https://bugzilla.novell.com/847506


< Previous Next >
This Thread
  • No further messages