drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Openswan
Name: |
Denial of Service in Openswan |
|
ID: |
FEDORA-2011-15127 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 14 |
|
Datum: |
So, 11. Dezember 2011, 13:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4073 |
|
Applikationen: |
Openswan |
|
Originalnachricht |
Name : openswan Product : Fedora 14 Version : 2.6.33 Release : 3.fc14 URL : http://www.openswan.org/ Summary : IPSEC implementation with IKEv1 and IKEv2 keying protocols Description : Openswan is a free implementation of IPsec & IKE for Linux. IPsec is the Internet Protocol Security and uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. Everything passing through the untrusted net is encrypted by the ipsec gateway machine and decrypted by the gateway at the other end of the tunnel. The resulting tunnel is a virtual private network or VPN.
This package contains the daemons and userland tools for setting up Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists in the default Linux kernel.
Openswan 2.6.x also supports IKEv2 (RFC4306)
------------------------------------------------------------------------------- - Update Information:
Fixes for cve-2011-4073. ------------------------------------------------------------------------------- - ChangeLog:
* Fri Oct 28 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-3 - Fixes for cve-2011-4073 * Wed Oct 5 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-2 - Fixes for cve-2011-3380 * Wed Mar 9 2011 Avesh Agarwal <avagarwa@redhat.com> - 2.6.33-1 - New upstream release openswan - Updated local patches - Removed USE_MODP_RFC5114 as upstream enabled it by default - updated spec file to reflect upstream changes related to doc * Wed Oct 20 2010 Avesh Agarwal <avagarwa@redhat.com> - 2.6.31-1 - New upstream release openswan-2.6.31 * Thu Sep 30 2010 Avesh Agarwal <avagarwa@redhat.com> - 2.6.29-2 - rhbz#636572, fix to openswan default start issue ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #748961 - CVE-2011-4073 openswan: use-after-free vulnerability leads to DoS https://bugzilla.redhat.com/show_bug.cgi?id=748961 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update openswan' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|