Synopsis:	Moderate: openswan security update
Issue date:	2010-11-16
CVE Names:	CVE-2010-3302 CVE-2010-3308 CVE-2010-3752
                   CVE-2010-3753

Two buffer overflow flaws were found in the Openswan client-side XAUTH
handling code used when connecting to certain Cisco gateways. A 
malicious or compromised VPN gateway could use these flaws to execute 
arbitrary code on the connecting Openswan client. (CVE-2010-3302, 
CVE-2010-3308)

Two input sanitization flaws were found in the Openswan client-side
handling of Cisco gateway banners. A malicious or compromised VPN 
gateway could use these flaws to execute arbitrary code on the 
connecting Openswan client. (CVE-2010-3752, CVE-2010-3753)

After installing this update, the ipsec service will be restarted 
automatically.


SL 6.x

      SRPMS:
openswan-2.6.24-8.el6_0.1.src.rpm
      i386:
openswan-2.6.24-8.el6_0.1.i686.rpm
openswan-doc-2.6.24-8.el6_0.1.i686.rpm
      x86_64:
openswan-2.6.24-8.el6_0.1.x86_64.rpm
openswan-doc-2.6.24-8.el6_0.1.x86_64.rpm

-Connie Sieh
-Troy Dawson