[Openswan dev] Openswan 2.6.39 released, fixes CVE-2013-2053
Simon Deziel
simon at xelerance.com
Fri Jun 28 19:10:15 UTC 2013
Hi Mattias,
Thanks for reporting this along with a commit ID. We applied it to
OpenSwan's git few days ago and forgot to report about it afterward.
Thanks again,
Simon
On 13-06-17 10:15 AM, Mattias Walström wrote:
> Hi!
> Just upgraded from 2.6.38 to 2.6.39 and noticed a problem, if the tunnel
> goes down, and up again
> the routes is not set as it should in the kernel, the second time it
> comes up.
>
> Applied the following patch from libreswan:
> https://github.com/libreswan/libreswan/commit/f58b4a322c54062994bd7bb0417553380f0d2f91
>
>
> This fixed the problems for me.
>
> Mattias
>
> On 2013-06-03 22:51, Patrick Naubert wrote:
>> Openswan 2.6.39 released to the community
>>
>> http://download.openswan.org/openswan/openswan-2.6.39.tar.gz
>> http://download.openswan.org/openswan/openswan-2.6.39.tar.gz.sig
>>
>> Fixes CVE-2013-2053, Linux kernel 3.9 compile problems, and includes
>> compilation hardening.
>>
>> This is a security release.
>>
>> Please be aware that the patches made available for Openswan for this
>> CVE, by the Libreswan community, were never reviewed by Xelerance
>> before their publication by the Libreswan team. The final fix
>> deployed in this release addresses the vulnerability itself and
>> doesn't rely on LIBNSS compile flags being true.
>>
>> Additionally, we are entertaining a new version numbering system for
>> the next releases.
>>
>> Monitor http://www.openswan.org/projects/openswan/news for further
>> information.
>>
>> v2.6.39 (May 31, 2013)
>> • Hardening patches from Florian Weimer
>> • Created .in files for distro packages [Patrick]
>> • Target deb builds for Precise instead of Lucid [Simon]
>> • Enable hardened builds by default [Simon]
>> • Bring 'ipsec policy' back form the dead [Simon]
>> • Drop the builddep on htmldoc and man2html as those are not
>> needed anymore [Simon]
>> • CVE-2013-2053 fix: Integrated fix from Andreas Steffan
>> • Refactor x509dn to seperate out atodn from other functions [MCR]
>> • Fixed regression test to be 64-bit and IPv6 aware [MCR]
>> • Patches for kernel 3.9 and changes to work with Linux 3.9 [MCR]
>> • Nighly builds fixes and whitespace fixes [MCR]
>> • Fix for three AES-GCM issues with key lengths 128, 192, 256 bits
>> and IV
>> of 8, 12, 16 bytes as per RFC 4106 [Avesh]
>> • SAREF: kernel patches updated to linux 3.2.0 [Simon]
>> • Refresh debian/control files to point to the right git URL [Simon]
>> • KLIPS: startklips-ip_route patch [Harald]
>> • MAST: updown.mast-scriptfix patch [Harald]
>> • Refresh debian/po from Debian [Simon]
>> • Fixed ipsec verify to avoid perl and use python instead. It
>> helps during minimum install so that openswan does not have to pull
>> perl packages, and it keeps minimal install really minimum. Also
>> Removed compilation of ipsec policy subprogram as it is not needed
>> with NETKEY. [Paul]
>> • NATT: rhbz #834400 NAT-OA reserved field issue. [Avesh]
>> • rhbz #834396 Coverity scan fixes, warnings, dead code. [Avesh]
>> • rhbz #785180 openswan uses ifconfig which is deprecated. [Avesh]
>> • barf: ipsec barf should not grep sparse file. [Paul]
>> • XAUTH: Phase15 as xauth and modecfg is called in openswan is not
>> handled properly when only xauth (without modecfg) is used. [Avesh]
>> • Interop: Fixes to interop issues (related to updating/removing
>> local interface with remote ip address and removing local routes)
>> between cisco ASA and openswan. [Avesh]
>> • XAUTH: Fixes to interop issues between cisco ASA and openswan in
>> main mode. These fixes prevents xauth/modecfg negotiation during IKE
>> rekey in main mode. [Avesh]
>> • rhbz #831676 [Avesh]
>> • IKE: ikev1 aes-gcm esp fixes [Avesh]
>> • IKE: ikev1/ikev2 sha2-256 related changes [Avesh]
>> • rhbz#609343: pluto crashes when removing logical interface [Avesh]
>> • Reading password from a file when creating keys. [Avesh]
>> • IKEv2: IKEv2 RFC4306/5996 related changes [Avesh]
>> • Interop: Fixes to solve interop issues between cisco ASA and
>> openswan in aggressive mode.[Avesh]
>> • Fix for the issue where ipsec help shows the list twice (rhbz
>> 524146, 509318) [Avesh]
>> • relpath changes [Avesh]
>> • Bugtracker bugs fixed:
>> #1308 forceencaps= setting does now show up in "ipsec auto --status"
>> [Matt Rogers]
>> #1329 IKEv2 core dumps on 2.6.32 with changes backported from the 2.6.38
>> tree [Steve Lanser]
>> #1349 pluto logging no subjectAltName matches ID '%fromcert', replaced
>> by subject DN [Tuomo]
>> #1371 SAref patches 3.2.0 [Simon]
>> • Fix url to bugs system. [Tuomo]
>>
>>
>>
>> _______________________________________________
>> Dev mailing list
>> Dev at lists.openswan.org
>> https://lists.openswan.org/mailman/listinfo/dev
>>
>
> _______________________________________________
> Dev mailing list
> Dev at lists.openswan.org
> https://lists.openswan.org/mailman/listinfo/dev
More information about the Dev
mailing list