Skip to navigation

Bug Fix Advisory openswan bug fix and enhancement update

Advisory: RHBA-2013:0077-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated openswan packages that fix multiple bugs and add various enhancements
are now available for Red Hat Enterprise Linux 5.

Openswan is a free implementation of IPsec and IKE (Internet Key Exchange) for
Linux. This package contains the daemons and user space tools for setting up
Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists in the
default Linux kernel. Openswan 2.6.x also supports IKEv2 (RFC4306).

* The openswan packages have been upgraded to incorporate a number of backported
patches which provide a number of bug fixes and enhancements over the previous
version. (BZ#807772)

All users of openswan are advised to upgrade to these updated packages, which
fix these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openswan-2.6.32-4.el5.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: 5823617c4df2fee1da3d90a32b0dc836
SHA-256: 630ccf32f5e532bac23c6de4ded099b6fcac2cd492d2d948f5404db6be161af4
 
IA-32:
openswan-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 3b63f400d8ae695d249d6c88214a0e2c
SHA-256: fe54d93aec68eb2020af5893f3b6fa9ae4e750bf21f5776bbeffe5847c9be636
openswan-debuginfo-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: e83d4b134ca89acece27c73d0e066409
SHA-256: c2a2f3daad7e1157a0f2d2c3ac9c858489ca64cd5a7cf52e20b829fa2d481c42
openswan-doc-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 7255d76e9465a495e02294ec1d2b7be7
SHA-256: f87b515fd05cbb661216e7d0f0d81d664353e3fb03fae9aa16a5b8dc1f18de4c
 
IA-64:
openswan-2.6.32-4.el5.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 7978d6b91afa5199bff77e825e87ce60
SHA-256: e48946ddc9e97dc8f0cb780a06ea935bbb21e9a3b5d705619f4489c7dc5bc612
openswan-debuginfo-2.6.32-4.el5.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9128b88d823e154418a7c33db0cd1761
SHA-256: b878aa9077681b849b8e0095781871fb31159e9434ef4faab2f264aabdc9f1e8
openswan-doc-2.6.32-4.el5.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: b11bada14b9a14dada4fd35817ea914f
SHA-256: a27c8414112d6e77ca1509c4ab8afa0216610432ed7b2a50b43134f0b26ab774
 
PPC:
openswan-2.6.32-4.el5.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 064891fdc46045b28e9a57675b71b3d6
SHA-256: 2d9e177bb886ba392801473a86825a1044b9a21c245f7ab73f8315c704f19b32
openswan-debuginfo-2.6.32-4.el5.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 68454986ae76f6e1ba5b0b6e77bc2169
SHA-256: de753983832fd1427b5e8bf4263b490fb4ac3d124238e4100aa8fc4cb4357581
openswan-doc-2.6.32-4.el5.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 0a439897825335a9e6a3492708b35dbe
SHA-256: 72a1c6cf696136d9634cde920550b089076b938502a15d5cbd5375ddba2bae71
 
s390x:
openswan-2.6.32-4.el5.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: 52c4070e0fe84da7ea91cb24ddabd416
SHA-256: 05e9113d08740ca35a32e2223c8d36c973f29f5690cb3520d65fdb05e543e5d8
openswan-debuginfo-2.6.32-4.el5.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: d6e371cbbde2ac91297507c4183ca001
SHA-256: cd42db8012706bba0d3622d7f339dcaddb47bcc5a140b6817e2bb7cd2b2d5f14
openswan-doc-2.6.32-4.el5.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: ba51e4f03328998a2bccd133cfed768d
SHA-256: 4fdc74b54036207a2ea7b313206986cc182b804e79fc83722aa1f0427e720d7d
 
x86_64:
openswan-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: d8df8243078ac9da1f0433b62d781b10
SHA-256: a4aa14d01048d6520f72199d2ed60d4292a76ec628da135a9ac1db7d3c296770
openswan-debuginfo-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: a1b468b3882b073a4bb7a2147fcc05a9
SHA-256: ae72955fe223bdc7817109764b7e3704b3f7fce92a556018bd5f20fba89dbe10
openswan-doc-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: fe353ac6f0dc26d05bdfbd8fa04f6fcb
SHA-256: 9b12599ea0c8e7d9f255a783812a93d4460d49ad08e7a083ff7eda0e6cbd9c42
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openswan-2.6.32-4.el5.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: 5823617c4df2fee1da3d90a32b0dc836
SHA-256: 630ccf32f5e532bac23c6de4ded099b6fcac2cd492d2d948f5404db6be161af4
 
IA-32:
openswan-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 3b63f400d8ae695d249d6c88214a0e2c
SHA-256: fe54d93aec68eb2020af5893f3b6fa9ae4e750bf21f5776bbeffe5847c9be636
openswan-debuginfo-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: e83d4b134ca89acece27c73d0e066409
SHA-256: c2a2f3daad7e1157a0f2d2c3ac9c858489ca64cd5a7cf52e20b829fa2d481c42
openswan-doc-2.6.32-4.el5.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 7255d76e9465a495e02294ec1d2b7be7
SHA-256: f87b515fd05cbb661216e7d0f0d81d664353e3fb03fae9aa16a5b8dc1f18de4c
 
x86_64:
openswan-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: d8df8243078ac9da1f0433b62d781b10
SHA-256: a4aa14d01048d6520f72199d2ed60d4292a76ec628da135a9ac1db7d3c296770
openswan-debuginfo-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: a1b468b3882b073a4bb7a2147fcc05a9
SHA-256: ae72955fe223bdc7817109764b7e3704b3f7fce92a556018bd5f20fba89dbe10
openswan-doc-2.6.32-4.el5.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: fe353ac6f0dc26d05bdfbd8fa04f6fcb
SHA-256: 9b12599ea0c8e7d9f255a783812a93d4460d49ad08e7a083ff7eda0e6cbd9c42
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

807772 - Update RHEL 6.2 OpenSwan bug fixes in RHEL 5.9, to conform to USGv6 cert



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/