Login
Newsletter
Werbung

Sicherheit: Denial of Service in Openswan
Aktuelle Meldungen Distributionen
Name: Denial of Service in Openswan
ID: FEDORA-2011-15127
Distribution: Fedora
Plattformen: Fedora 14
Datum: So, 11. Dezember 2011, 13:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4073
Applikationen: Openswan

Originalnachricht

Name        : openswan
Product : Fedora 14
Version : 2.6.33
Release : 3.fc14
URL : http://www.openswan.org/
Summary : IPSEC implementation with IKEv1 and IKEv2 keying protocols
Description :
Openswan is a free implementation of IPsec & IKE for Linux. IPsec is
the Internet Protocol Security and uses strong cryptography to provide
both authentication and encryption services. These services allow you
to build secure tunnels through untrusted networks. Everything passing
through the untrusted net is encrypted by the ipsec gateway machine and
decrypted by the gateway at the other end of the tunnel. The resulting
tunnel is a virtual private network or VPN.

This package contains the daemons and userland tools for setting up
Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists
in the default Linux kernel.

Openswan 2.6.x also supports IKEv2 (RFC4306)

-------------------------------------------------------------------------------
-
Update Information:

Fixes for cve-2011-4073.
-------------------------------------------------------------------------------
-
ChangeLog:

* Fri Oct 28 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-3
- Fixes for cve-2011-4073
* Wed Oct 5 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-2
- Fixes for cve-2011-3380
* Wed Mar 9 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-1
- New upstream release openswan
- Updated local patches
- Removed USE_MODP_RFC5114 as upstream enabled it by default
- updated spec file to reflect upstream changes related to doc
* Wed Oct 20 2010 Avesh Agarwal <avagarwa@redhat.com> - 2.6.31-1
- New upstream release openswan-2.6.31
* Thu Sep 30 2010 Avesh Agarwal <avagarwa@redhat.com> - 2.6.29-2
- rhbz#636572, fix to openswan default start issue
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #748961 - CVE-2011-4073 openswan: use-after-free vulnerability
leads to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=748961
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update openswan' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung