[ubuntu/hardy-security] openswan_2.4.9+dfsg-1ubuntu0.1_ia64_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_powerpc_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_lpia_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_sparc_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_hppa_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_i386_translations.tar.gz, openswan_2.4.9+dfsg-1ubuntu0.1_amd64_translations.tar.gz, openswan 1:2.4.9+dfsg-1ubuntu0.1 (Accepted)

Harald Jenny harald at a-little-linux-box.at
Wed Jan 18 15:03:20 UTC 2012


openswan (1:2.4.9+dfsg-1ubuntu0.1) hardy-security; urgency=low

  * SECURITY UPDATE: symlink attack through predictable filenames in /tmp
    - debian/patches/02-fix-unsecure-tmp-file.dpatch: change
      programs/livetest/livetest.in to use mktemp for temporary file creation.
      Patch taken from Debian openswan 1:2.4.12+dfsg-1.3 package.
    - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374
  * SECURITY UPDATE: denial of service attack via malicious Dead Peer Detection
    packet
    - debian/patches/03-CVE-2009-0790.dpatch: adjust programs/pluto/demux.c to
      check for a possbile NULL value. Patch taken from Debian openswan
      1:2.4.12+dfsg-1.3+lenny1 package.
    - CVE-2009-0790
  * SECURITY UPDATE: denial of service attack via specially crafted X.509
    certificate
    - debian/patches/04-CVE-2009-2185.dpatch: create include/oswtime.h and
      modify programs/pluto/asn1.c as well as lib/libopenswan/optionsfrom.c to
      do proper checks on certificate objects length. Patch taken from Debian
      openswan 1:2.4.12+dfsg-1.3+lenny2 package.
    - CVE-2009-2185
  * SECURITY UPDATE: denial of service attack via deliberately interrupted
    IPSec connection attempt
    - debian/patches/05-2.4.9-CVE-2011-4073.dpatch: change
      programs/pluto/ikev1_continuations.h and programs/pluto/ikev1_quick.c to
      check for vanished ISAKMP SA in Quick Mode negotiation. Patch taken from
      Debian openswan 1:2.4.12+dfsg-1.3+lenny3 package and slightly modified.
    - CVE-2011-4073
  (LP: #917754)

Date: Tue, 17 Jan 2012 16:53:31 +0100
Changed-By: Harald Jenny <harald at a-little-linux-box.at>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/hardy/+source/openswan/1:2.4.9+dfsg-1ubuntu0.1
-------------- next part --------------
Format: 1.7
Date: Tue, 17 Jan 2012 16:53:31 +0100
Source: openswan
Binary: openswan openswan-modules-source linux-patch-openswan
Architecture: source
Version: 1:2.4.9+dfsg-1ubuntu0.1
Distribution: hardy-security
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Harald Jenny <harald at a-little-linux-box.at>
Description: 
 linux-patch-openswan - IPSEC Linux kernel support for Openswan
 openswan   - IPSEC utilities for Openswan
 openswan-modules-source - IPSEC kernel modules source for Openswan
Launchpad-Bugs-Fixed: 917754
Changes: 
 openswan (1:2.4.9+dfsg-1ubuntu0.1) hardy-security; urgency=low
 .
   * SECURITY UPDATE: symlink attack through predictable filenames in /tmp
     - debian/patches/02-fix-unsecure-tmp-file.dpatch: change
       programs/livetest/livetest.in to use mktemp for temporary file creation.
       Patch taken from Debian openswan 1:2.4.12+dfsg-1.3 package.
     - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374
   * SECURITY UPDATE: denial of service attack via malicious Dead Peer Detection
     packet
     - debian/patches/03-CVE-2009-0790.dpatch: adjust programs/pluto/demux.c to
       check for a possbile NULL value. Patch taken from Debian openswan
       1:2.4.12+dfsg-1.3+lenny1 package.
     - CVE-2009-0790
   * SECURITY UPDATE: denial of service attack via specially crafted X.509
     certificate
     - debian/patches/04-CVE-2009-2185.dpatch: create include/oswtime.h and
       modify programs/pluto/asn1.c as well as lib/libopenswan/optionsfrom.c to
       do proper checks on certificate objects length. Patch taken from Debian
       openswan 1:2.4.12+dfsg-1.3+lenny2 package.
     - CVE-2009-2185
   * SECURITY UPDATE: denial of service attack via deliberately interrupted
     IPSec connection attempt
     - debian/patches/05-2.4.9-CVE-2011-4073.dpatch: change
       programs/pluto/ikev1_continuations.h and programs/pluto/ikev1_quick.c to
       check for vanished ISAKMP SA in Quick Mode negotiation. Patch taken from
       Debian openswan 1:2.4.12+dfsg-1.3+lenny3 package and slightly modified.
     - CVE-2011-4073
   (LP: #917754)
Files: 
 2c8d55ece3fda516726cdef06f8deb37 1603 net optional openswan_2.4.9+dfsg-1ubuntu0.1.dsc
 22b0a2e05dc15699ca02dcea23c478f7 93448 net optional openswan_2.4.9+dfsg-1ubuntu0.1.diff.gz
Original-Maintainer: Rene Mayrhofer <rmayr at debian.org>


More information about the Hardy-changes mailing list