Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Openswan
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Openswan
ID: SUSE-SU-2013:1150-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 10 SP4, SUSE Linux Enterprise Server 10 SP4, SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise Server 11 SP2 for VMware
Datum: Sa, 6. Juli 2013, 08:48
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
Applikationen: Openswan

Originalnachricht

   SUSE Security Update: Security update for openswan
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:1150-1
Rating: important
References: #824316
Cross-References: CVE-2013-2053
Affected Products:
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:


This openswan update fixes a remote buffer overflow issue
(bnc#824316 / CVE-2013-2053).

Security Issue reference:

* CVE-2013-2053
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
>


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 11 SP2 for VMware:

zypper in -t patch slessp2-openswan-7925

- SUSE Linux Enterprise Server 11 SP2:

zypper in -t patch slessp2-openswan-7925

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

openswan-2.6.16-1.38.1
openswan-doc-2.6.16-1.38.1

- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

openswan-2.6.16-1.38.1
openswan-doc-2.6.16-1.38.1

- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

openswan-2.4.4-18.21.1

- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

openswan-2.4.4-18.21.1


References:

http://support.novell.com/security/cve/CVE-2013-2053.html
https://bugzilla.novell.com/824316
?keywords=4e623ae4a993ce51b1b6b7d9b96ebcb5
?keywords=f043270acc009a30fe4516ffd47e47d9

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung