Synopsis: Moderate: openswan security update Issue date: 2010-11-16 CVE Names: CVE-2010-3302 CVE-2010-3308 CVE-2010-3752 CVE-2010-3753 Two buffer overflow flaws were found in the Openswan client-side XAUTH handling code used when connecting to certain Cisco gateways. A malicious or compromised VPN gateway could use these flaws to execute arbitrary code on the connecting Openswan client. (CVE-2010-3302, CVE-2010-3308) Two input sanitization flaws were found in the Openswan client-side handling of Cisco gateway banners. A malicious or compromised VPN gateway could use these flaws to execute arbitrary code on the connecting Openswan client. (CVE-2010-3752, CVE-2010-3753) After installing this update, the ipsec service will be restarted automatically. SL 6.x SRPMS: openswan-2.6.24-8.el6_0.1.src.rpm i386: openswan-2.6.24-8.el6_0.1.i686.rpm openswan-doc-2.6.24-8.el6_0.1.i686.rpm x86_64: openswan-2.6.24-8.el6_0.1.x86_64.rpm openswan-doc-2.6.24-8.el6_0.1.x86_64.rpm -Connie Sieh -Troy Dawson