SUSE Security Update: Security update for openswan
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1150-1
Rating:             important
References:         #824316 
Cross-References:   CVE-2013-2053
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


   This openswan update fixes a remote buffer overflow issue
   (bnc#824316 /  CVE-2013-2053).

   Security Issue reference:

   * CVE-2013-2053
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-openswan-7925

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-openswan-7925

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      openswan-2.6.16-1.38.1
      openswan-doc-2.6.16-1.38.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):

      openswan-2.6.16-1.38.1
      openswan-doc-2.6.16-1.38.1

   - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

      openswan-2.4.4-18.21.1

   - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

      openswan-2.4.4-18.21.1


References:

   https://www.suse.com/security/cve/CVE-2013-2053.html
   https://bugzilla.novell.com/824316
   https://login.microfocus.com/nidp/app/login
   https://login.microfocus.com/nidp/app/login

SuSE: 2013:1150-1: important: openswan

July 5, 2013
An update that fixes one vulnerability is now available

Summary

This openswan update fixes a remote buffer overflow issue (bnc#824316 / CVE-2013-2053). Security Issue reference: * CVE-2013-2053 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-openswan-7925 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-openswan-7925 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): openswan-2.6.16-1.38.1 openswan-doc-2.6.16-1.38.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): openswan-2.6.16-1.38.1 openswan-doc-2.6.16-1.38.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): openswan-2.4.4-18.21.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): openswan-2.4.4-18.21.1

References

#824316

Cross- CVE-2013-2053

Affected Products:

SUSE Linux Enterprise Server 11 SP2 for VMware

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Server 10 SP4

SUSE Linux Enterprise Desktop 10 SP4

https://www.suse.com/security/cve/CVE-2013-2053.html

https://bugzilla.novell.com/824316

https://login.microfocus.com/nidp/app/login

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2013:1150-1
Rating: important

Related News