[SECURITY] Fedora 13 Update: openswan-2.6.29-1.fc13

updates at fedoraproject.org updates at fedoraproject.org
Fri Oct 8 20:37:09 UTC 2010


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2010-15516
2010-09-30 10:01:43
--------------------------------------------------------------------------------

Name        : openswan
Product     : Fedora 13
Version     : 2.6.29
Release     : 1.fc13
URL         : http://www.openswan.org/
Summary     : IPSEC implementation with IKEv1 and IKEv2 keying protocols
Description :
Openswan is a free implementation of IPsec & IKE for Linux.  IPsec is
the Internet Protocol Security and uses strong cryptography to provide
both authentication and encryption services.  These services allow you
to build secure tunnels through untrusted networks.  Everything passing
through the untrusted net is encrypted by the ipsec gateway machine and
decrypted by the gateway at the other end of the tunnel.  The resulting
tunnel is a virtual private network or VPN.

This package contains the daemons and userland tools for setting up
Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists
in the default Linux kernel.

Openswan 2.6.x also supports IKEv2 (RFC4306)

--------------------------------------------------------------------------------
Update Information:

- New upstream release
- Fixes for CVE-2010-3308 and CVE-2010-3302
--------------------------------------------------------------------------------
ChangeLog:

* Mon Sep 27 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.29-1
- New upstream release
- Fixes for CVE-2010-3308 and CVE-2010-3302
* Mon Jul 19 2010 Avesh Agarwal <avagarwa at redhat.com> - 2.6.27-1
- New upstream release
- NetworkManager-openswan plugin related changes
- Fixes for bz 584224
- Updated old patches
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #637924 - CVE-2010-3308 Openswan cisco banner option handling vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=637924
  [ 2 ] Bug #634264 - CVE-2010-3302 openswan: buffer overflow vulnerability in XAUTH client-side support
        https://bugzilla.redhat.com/show_bug.cgi?id=634264
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update openswan' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list