blob: 4296f860c5fad716c5f5729baf4a5a56adf24b8a [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201203-13">
<title>Openswan: Denial of Service</title>
<synopsis>Multiple vulnerabilities in Openswan may create a Denial of Service
<product type="ebuild">Openswan</product>
<announced>March 16, 2012</announced>
<revised>March 16, 2012: 1</revised>
<access>local, remote</access>
<package name="net-misc/openswan" auto="yes" arch="*">
<unaffected range="ge">2.6.37</unaffected>
<vulnerable range="lt">2.6.37</vulnerable>
<p>Openswan is an implementation of IPsec for Linux.</p>
<p>Two vulnerabilities have been found in Openswan:</p>
<li>Improper permissions are used on /var/run/ and
/var/lock/subsys/ipsec (CVE-2011-2147).
<li>Openswan contains a use-after-free error in the cryptographic helper
handler (CVE-2011-4073).
<impact type="normal">
<p>A remote authenticated attacker or a local attacker may be able to cause
a Denial of Service condition.
<p>There is no known workaround at this time.</p>
<p>All Openswan users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-misc/openswan-2.6.37"
<p>NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since November 10, 2011. It is likely that your system is
already no longer affected by this issue.
<uri link="">CVE-2011-2147</uri>
<uri link="">CVE-2011-4073</uri>
<metadata timestamp="Tue, 06 Mar 2012 21:14:35 +0000" tag="requester">ackle</metadata>
<metadata timestamp="Fri, 16 Mar 2012 10:56:03 +0000" tag="submitter">ackle</metadata>