drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in strongSwan
Name: |
Mangelnde Prüfung von Zertifikaten in strongSwan |
|
ID: |
FEDORA-2014-5231 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 20 |
|
Datum: |
Do, 24. April 2014, 18:41 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338 |
|
Applikationen: |
strongSwan |
|
Originalnachricht |
Name : strongswan Product : Fedora 20 Version : 5.1.3 Release : 1.fc20 URL : http://www.strongswan.org/ Summary : An OpenSource IPsec-based VPN Solution Description : The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.
------------------------------------------------------------------------------- - Update Information:
CVE-2014-2338 ------------------------------------------------------------------------------- - ChangeLog:
* Tue Apr 15 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.3-1 - new version 5.1.3 * Mon Apr 14 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.3rc1-1 - new version 5.1.3rc1 * Mon Mar 24 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.2-4 - #1069928 - updated libexec patch. * Tue Mar 18 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.2-3 - fixed el6 initscript - fixed pki directory location * Fri Mar 14 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.2-2 - clean up the specfile a bit - replace the initscript patch with an individual initscript - patch to build for epel6 * Mon Mar 3 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.2-1 - #1071353 - bump to 5.1.2 - #1071338 - strongswan is compiled without xauth-pam plugin - remove obsolete patches - sent all patches upstream - added comments to all patches - don't touch the config with sed * Thu Feb 20 2014 Avesh Agarwal <avagarwa@redhat.com> - 5.1.1-6 - Fixed full hardening for strongswan (full relro and PIE). The previous macros had a typo and did not work (see bz#1067119). - Fixed tnc package description to reflect the current state of the package. - Fixed pki binary and moved it to /usr/libexece/strongswan as others binaries are there too. * Wed Feb 19 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.1-5 - #903638 - SELinux is preventing /usr/sbin/xtables-multi from 'read' accesses on the chr_file /dev/random * Thu Jan 9 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.1-4 - Removed redundant patches and *.spec commands caused by branch merging * Wed Jan 8 2014 Pavel Šimerda <psimerda@redhat.com> - 5.1.1-3 - rebuilt * Mon Dec 2 2013 Avesh Agarwal <avagarwa@redhat.com> - 5.1.1-2 - Resolves: 973315 - Resolves: 1036844 * Fri Nov 1 2013 Avesh Agarwal <avagarwa@redhat.com> - 5.1.1-1 - Support for PT-TLS (RFC 6876) - Support for SWID IMC/IMV - Support for command line IKE client charon-cmd - Changed location of pki to /usr/bin - Added swid tags files - Added man pages for pki and charon-cmd - Renamed pki to strongswan-pki to avoid conflict with pki-core/pki-tools package. - Update local patches - Fixes CVE-2013-6075 - Fixes CVE-2013-6076 - Fixed autoconf/automake issue as configure.ac got changed and it required running autoreconf during the build process. - added strongswan signature file to the sources. * Thu Sep 12 2013 Avesh Agarwal <avagarwa@redhat.com> - 5.1.0-3 - Fixed initialization crash of IMV and IMC particularly attestation imv/imc as libstrongswas was not getting initialized. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1081760 - CVE-2014-2338 strongswan: authentication bypass flaw in IKEv2 https://bugzilla.redhat.com/show_bug.cgi?id=1081760 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update strongswan' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|