SCIENTIFIC-LINUX-ERRATA Archives

October 2011

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Thu, 6 Oct 2011 09:06:22 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (31 lines)
Synopsis:    Moderate: openswan security update
Issue Date:  2011-10-05
CVE Numbers: CVE-2011-3380


Openswan is a free implementation of Internet Protocol Security (IPsec)
and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide
both authentication and encryption services. These services allow you to
build secure tunnels through untrusted networks.

A NULL pointer dereference flaw was found in the way Openswan's pluto IKE
daemon handled certain error conditions. A remote, unauthenticated attacker
could send a specially-crafted IKE packet that would crash the pluto
daemon. (CVE-2011-3380)

All users of openswan are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, the ipsec service will be restarted automatically.

SL6:
  i386
     openswan-2.6.32-4.el6_1.2.i686.rpm
     openswan-debuginfo-2.6.32-4.el6_1.2.i686.rpm
     openswan-doc-2.6.32-4.el6_1.2.i686.rpm
  x86_64
     openswan-2.6.32-4.el6_1.2.x86_64.rpm
     openswan-debuginfo-2.6.32-4.el6_1.2.x86_64.rpm
     openswan-doc-2.6.32-4.el6_1.2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2