Skip to navigation

Security Advisory Important: openswan security update

Advisory: RHSA-2013:0827-1
Type: Security Advisory
Severity: Important
Issued on: 2013-05-15
Last updated on: 2013-05-15
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux Long Life (v. 5.9 server)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2013-2053

Details

Updated openswan packages that fix one security issue are now available for
Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Openswan is a free implementation of Internet Protocol Security (IPsec)
and Internet Key Exchange (IKE). IPsec uses strong cryptography to provide
both authentication and encryption services. These services allow you to
build secure tunnels through untrusted networks. When using Opportunistic
Encryption, Openswan's pluto IKE daemon requests DNS TXT records to obtain
public RSA keys of itself and its peers.

A buffer overflow flaw was found in Openswan. If Opportunistic Encryption
were enabled ("oe=yes" in "/etc/ipsec.conf") and an RSA key configured, an
attacker able to cause a system to perform a DNS lookup for an
attacker-controlled domain containing malicious records (such as by sending
an email that triggers a DKIM or SPF DNS record lookup) could cause
Openswan's pluto IKE daemon to crash or, potentially, execute arbitrary
code with root privileges. With "oe=yes" but no RSA key configured, the
issue can only be triggered by attackers on the local network who can
control the reverse DNS entry of the target system. Opportunistic
Encryption is disabled by default. (CVE-2013-2053)

This issue was discovered by Florian Weimer of the Red Hat Product Security
Team.

All users of openswan are advised to upgrade to these updated packages,
which contain backported patches to correct this issue. After installing
this update, the ipsec service will be restarted automatically.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openswan-2.6.32-5.el5_9.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: f48466a675f3be37b212ddaaa5f5204a
SHA-256: c2a2bc671fd049478a7eaa0f8f78bc39c6e5d4128e3395ec10a08641766e1855
 
IA-32:
openswan-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9285577efc26fccbbe0b2b97fa1f6858
SHA-256: a320daa9ac448013fc054725042abe9f0b2a84de0cdd8098ef3c925a92b242d4
openswan-debuginfo-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: bf0bc0787844c14c97f3d9f4073dbee3
SHA-256: b2bc94ec4477580e9a6c419d307cf6c8d679e598ac22b95b11d26c9738ee5d54
openswan-doc-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 35c8f6f02f7ad229179f6cae959c57f1
SHA-256: fa85bc3282372eb52ff46317132b3ca5b19c95ab61612a23d7e65a112f738540
 
IA-64:
openswan-2.6.32-5.el5_9.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 16a26206fd94d00a780c827aebd1f87c
SHA-256: 308e5d4356b5d05bb752920b8821a1326dc849bf02b25eacd18d8c0ebee3002f
openswan-debuginfo-2.6.32-5.el5_9.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 226be26194442866117e8fcdf502c7b8
SHA-256: d0a088fa45761a560b8849a6f7dc2698b139a3129f381c755fca6a3165f6469d
openswan-doc-2.6.32-5.el5_9.ia64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 8df486e8a0f68ed54f96896c745c35d2
SHA-256: fc07d5cacd24e1917f287fd13cb60f513169efeed5217e64ac6bacb5fa17ac56
 
PPC:
openswan-2.6.32-5.el5_9.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 739d4effb7cde816754a066a9bfaf34a
SHA-256: e40d69d4c7950b073a2cc1f412bd97c57d703742e0b9595b23ad180df6f757c9
openswan-debuginfo-2.6.32-5.el5_9.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 2f56fb9283ab1d013d3c5b6427cdbb2a
SHA-256: 763faf99752c5568b71d36a38daba7b7844478f828478435b43caba266efa8f0
openswan-doc-2.6.32-5.el5_9.ppc.rpm
File outdated by:  RHSA-2014:0185
    MD5: 825cfb2fa2212f6409f589dfc2ba9711
SHA-256: 32ae6a52d25fb5991629cf700383862ce260be5228e08f1b0bf40a64809530e9
 
s390x:
openswan-2.6.32-5.el5_9.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: df8b34c53229542f663ab61e0bed5c6f
SHA-256: 5c0763c23caee50c28450832c3f3d8e44c393cd103322f44aae7d0dbbc7403c1
openswan-debuginfo-2.6.32-5.el5_9.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: 443b1b0e518e80af29fcc84e2a1c3ef9
SHA-256: f53dc420b21d650d410fdfc3cba061e12b0444ff780b3e2bd272b4d5bdfb9c79
openswan-doc-2.6.32-5.el5_9.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: 51ade300f2f5b956a9a720de73449f31
SHA-256: ab4a50fecbc99f0a5c126a36bd257302c3cdb93728c3463fa7a0adfb35dc5443
 
x86_64:
openswan-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 26b917b3b90a4aca6782c1e0b5a398a6
SHA-256: 254f39f227023d3fc6deaceb03ca843317201122065313d5869ebbc8720808d1
openswan-debuginfo-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 684946edad2d9ab2b902aad6fe56d26b
SHA-256: d1d8f8d031cbfb410125bfc6c5df13bd3d2f027da6ae96440d8bea0eb323adb6
openswan-doc-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: d17b429cc75a58dc9ca9c0599f0f0558
SHA-256: 2edf46907bdb6a686cd3035c22c778bcc24aefc4020a11f81d55be76acc75257
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openswan-2.6.32-5.el5_9.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: f48466a675f3be37b212ddaaa5f5204a
SHA-256: c2a2bc671fd049478a7eaa0f8f78bc39c6e5d4128e3395ec10a08641766e1855
 
IA-32:
openswan-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9285577efc26fccbbe0b2b97fa1f6858
SHA-256: a320daa9ac448013fc054725042abe9f0b2a84de0cdd8098ef3c925a92b242d4
openswan-debuginfo-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: bf0bc0787844c14c97f3d9f4073dbee3
SHA-256: b2bc94ec4477580e9a6c419d307cf6c8d679e598ac22b95b11d26c9738ee5d54
openswan-doc-2.6.32-5.el5_9.i386.rpm
File outdated by:  RHSA-2014:0185
    MD5: 35c8f6f02f7ad229179f6cae959c57f1
SHA-256: fa85bc3282372eb52ff46317132b3ca5b19c95ab61612a23d7e65a112f738540
 
x86_64:
openswan-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 26b917b3b90a4aca6782c1e0b5a398a6
SHA-256: 254f39f227023d3fc6deaceb03ca843317201122065313d5869ebbc8720808d1
openswan-debuginfo-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 684946edad2d9ab2b902aad6fe56d26b
SHA-256: d1d8f8d031cbfb410125bfc6c5df13bd3d2f027da6ae96440d8bea0eb323adb6
openswan-doc-2.6.32-5.el5_9.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: d17b429cc75a58dc9ca9c0599f0f0558
SHA-256: 2edf46907bdb6a686cd3035c22c778bcc24aefc4020a11f81d55be76acc75257
 
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
openswan-2.6.32-20.el6_4.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: d740abd7b54199c5ff252ce4a1ab437a
SHA-256: 79e931620b3f4ba074b2aa2beab7ecdde5ffddbd3af2a304dbaa3002a22841ed
 
IA-32:
openswan-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9ffa6ba45ffbf809c6a66f688abc2151
SHA-256: eb994d4778f5994416884c66c7e786b7a306d95b563c4dbc3cf2bfa179965551
openswan-debuginfo-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: c40b3456dadad0e65028432c183807be
SHA-256: 4cb9639348b32055943f06f65dddfa4d2dbb28380ee5c70b64b9716291064f9f
openswan-doc-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 3b7cfcff163d6c4f4787bb7e71c34b9e
SHA-256: b43fc1021fe0e99841731304f318da325ad396d0ccd7d234f4658ba5d0a67c9c
 
x86_64:
openswan-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: f5f2646608efe2a5f14f75a85a1b31c8
SHA-256: 2117f32b1e35552b5eaa91db7043454c7e1b083ecc5d5358cb3ee2c3141d2e31
openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: ee82850a8e097e7949d08f775fe766f3
SHA-256: a3706b9bf1a63bd6bf7803018b695b8bd45900e0338856f6173cf20029410edd
openswan-doc-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 8ad9bccddd942ca2b23292ba8fbb93be
SHA-256: 961f0c1bc35d5705afb3462c79560d838fb16a7cfd808cdf007e5b6dcae2319f
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
openswan-2.6.32-5.el5_9.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: f48466a675f3be37b212ddaaa5f5204a
SHA-256: c2a2bc671fd049478a7eaa0f8f78bc39c6e5d4128e3395ec10a08641766e1855
 
IA-32:
openswan-2.6.32-5.el5_9.i386.rpm     MD5: 9285577efc26fccbbe0b2b97fa1f6858
SHA-256: a320daa9ac448013fc054725042abe9f0b2a84de0cdd8098ef3c925a92b242d4
openswan-debuginfo-2.6.32-5.el5_9.i386.rpm     MD5: bf0bc0787844c14c97f3d9f4073dbee3
SHA-256: b2bc94ec4477580e9a6c419d307cf6c8d679e598ac22b95b11d26c9738ee5d54
openswan-doc-2.6.32-5.el5_9.i386.rpm     MD5: 35c8f6f02f7ad229179f6cae959c57f1
SHA-256: fa85bc3282372eb52ff46317132b3ca5b19c95ab61612a23d7e65a112f738540
 
IA-64:
openswan-2.6.32-5.el5_9.ia64.rpm     MD5: 16a26206fd94d00a780c827aebd1f87c
SHA-256: 308e5d4356b5d05bb752920b8821a1326dc849bf02b25eacd18d8c0ebee3002f
openswan-debuginfo-2.6.32-5.el5_9.ia64.rpm     MD5: 226be26194442866117e8fcdf502c7b8
SHA-256: d0a088fa45761a560b8849a6f7dc2698b139a3129f381c755fca6a3165f6469d
openswan-doc-2.6.32-5.el5_9.ia64.rpm     MD5: 8df486e8a0f68ed54f96896c745c35d2
SHA-256: fc07d5cacd24e1917f287fd13cb60f513169efeed5217e64ac6bacb5fa17ac56
 
PPC:
openswan-2.6.32-5.el5_9.ppc.rpm     MD5: 739d4effb7cde816754a066a9bfaf34a
SHA-256: e40d69d4c7950b073a2cc1f412bd97c57d703742e0b9595b23ad180df6f757c9
openswan-debuginfo-2.6.32-5.el5_9.ppc.rpm     MD5: 2f56fb9283ab1d013d3c5b6427cdbb2a
SHA-256: 763faf99752c5568b71d36a38daba7b7844478f828478435b43caba266efa8f0
openswan-doc-2.6.32-5.el5_9.ppc.rpm     MD5: 825cfb2fa2212f6409f589dfc2ba9711
SHA-256: 32ae6a52d25fb5991629cf700383862ce260be5228e08f1b0bf40a64809530e9
 
s390x:
openswan-2.6.32-5.el5_9.s390x.rpm     MD5: df8b34c53229542f663ab61e0bed5c6f
SHA-256: 5c0763c23caee50c28450832c3f3d8e44c393cd103322f44aae7d0dbbc7403c1
openswan-debuginfo-2.6.32-5.el5_9.s390x.rpm     MD5: 443b1b0e518e80af29fcc84e2a1c3ef9
SHA-256: f53dc420b21d650d410fdfc3cba061e12b0444ff780b3e2bd272b4d5bdfb9c79
openswan-doc-2.6.32-5.el5_9.s390x.rpm     MD5: 51ade300f2f5b956a9a720de73449f31
SHA-256: ab4a50fecbc99f0a5c126a36bd257302c3cdb93728c3463fa7a0adfb35dc5443
 
x86_64:
openswan-2.6.32-5.el5_9.x86_64.rpm     MD5: 26b917b3b90a4aca6782c1e0b5a398a6
SHA-256: 254f39f227023d3fc6deaceb03ca843317201122065313d5869ebbc8720808d1
openswan-debuginfo-2.6.32-5.el5_9.x86_64.rpm     MD5: 684946edad2d9ab2b902aad6fe56d26b
SHA-256: d1d8f8d031cbfb410125bfc6c5df13bd3d2f027da6ae96440d8bea0eb323adb6
openswan-doc-2.6.32-5.el5_9.x86_64.rpm     MD5: d17b429cc75a58dc9ca9c0599f0f0558
SHA-256: 2edf46907bdb6a686cd3035c22c778bcc24aefc4020a11f81d55be76acc75257
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
openswan-2.6.32-5.el5_9.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: f48466a675f3be37b212ddaaa5f5204a
SHA-256: c2a2bc671fd049478a7eaa0f8f78bc39c6e5d4128e3395ec10a08641766e1855
 
IA-32:
openswan-2.6.32-5.el5_9.i386.rpm     MD5: 9285577efc26fccbbe0b2b97fa1f6858
SHA-256: a320daa9ac448013fc054725042abe9f0b2a84de0cdd8098ef3c925a92b242d4
openswan-debuginfo-2.6.32-5.el5_9.i386.rpm     MD5: bf0bc0787844c14c97f3d9f4073dbee3
SHA-256: b2bc94ec4477580e9a6c419d307cf6c8d679e598ac22b95b11d26c9738ee5d54
openswan-doc-2.6.32-5.el5_9.i386.rpm     MD5: 35c8f6f02f7ad229179f6cae959c57f1
SHA-256: fa85bc3282372eb52ff46317132b3ca5b19c95ab61612a23d7e65a112f738540
 
IA-64:
openswan-2.6.32-5.el5_9.ia64.rpm     MD5: 16a26206fd94d00a780c827aebd1f87c
SHA-256: 308e5d4356b5d05bb752920b8821a1326dc849bf02b25eacd18d8c0ebee3002f
openswan-debuginfo-2.6.32-5.el5_9.ia64.rpm     MD5: 226be26194442866117e8fcdf502c7b8
SHA-256: d0a088fa45761a560b8849a6f7dc2698b139a3129f381c755fca6a3165f6469d
openswan-doc-2.6.32-5.el5_9.ia64.rpm     MD5: 8df486e8a0f68ed54f96896c745c35d2
SHA-256: fc07d5cacd24e1917f287fd13cb60f513169efeed5217e64ac6bacb5fa17ac56
 
x86_64:
openswan-2.6.32-5.el5_9.x86_64.rpm     MD5: 26b917b3b90a4aca6782c1e0b5a398a6
SHA-256: 254f39f227023d3fc6deaceb03ca843317201122065313d5869ebbc8720808d1
openswan-debuginfo-2.6.32-5.el5_9.x86_64.rpm     MD5: 684946edad2d9ab2b902aad6fe56d26b
SHA-256: d1d8f8d031cbfb410125bfc6c5df13bd3d2f027da6ae96440d8bea0eb323adb6
openswan-doc-2.6.32-5.el5_9.x86_64.rpm     MD5: d17b429cc75a58dc9ca9c0599f0f0558
SHA-256: 2edf46907bdb6a686cd3035c22c778bcc24aefc4020a11f81d55be76acc75257
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
openswan-2.6.32-20.el6_4.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: d740abd7b54199c5ff252ce4a1ab437a
SHA-256: 79e931620b3f4ba074b2aa2beab7ecdde5ffddbd3af2a304dbaa3002a22841ed
 
IA-32:
openswan-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9ffa6ba45ffbf809c6a66f688abc2151
SHA-256: eb994d4778f5994416884c66c7e786b7a306d95b563c4dbc3cf2bfa179965551
openswan-debuginfo-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: c40b3456dadad0e65028432c183807be
SHA-256: 4cb9639348b32055943f06f65dddfa4d2dbb28380ee5c70b64b9716291064f9f
openswan-doc-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 3b7cfcff163d6c4f4787bb7e71c34b9e
SHA-256: b43fc1021fe0e99841731304f318da325ad396d0ccd7d234f4658ba5d0a67c9c
 
PPC:
openswan-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 83f2c68c42988d618b3349464b992761
SHA-256: bd9a1460ee8ebd4493f40da01a43e53e6aad62c5c58e3e29de736200d420b0b5
openswan-debuginfo-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 6e133318a06b4db89deeb9b39aebf388
SHA-256: f543d170f7f9b7c02b49a02365fd3d4638599ee287b2550b3c8e84d09d695b62
openswan-doc-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 6392db7a8eee790b1c5de2785d4ee5b7
SHA-256: 9afa992294c584887f3e0c40a97dfb5757e1348eaf646cecdf879a61de949fcc
 
s390x:
openswan-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: b4e8d8011a94c93cd538044e57414694
SHA-256: eb68c6e4e32f4fac19400e8e5a9483d14413664dbee38050a656cd3d93ca7422
openswan-debuginfo-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: c91273151e5c735614a5bc72dc821d09
SHA-256: b7390f08dda336cf7a677653b7616a06dfd7f47bc4848181109f6c9f3a9a153b
openswan-doc-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHSA-2014:0185
    MD5: 2b89bb939b46f542a883e8dc85139408
SHA-256: a22432c4e0e7a848e281d4710b3bf2e71ffbb8361f9919caf3a3df71b6033ac9
 
x86_64:
openswan-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: f5f2646608efe2a5f14f75a85a1b31c8
SHA-256: 2117f32b1e35552b5eaa91db7043454c7e1b083ecc5d5358cb3ee2c3141d2e31
openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: ee82850a8e097e7949d08f775fe766f3
SHA-256: a3706b9bf1a63bd6bf7803018b695b8bd45900e0338856f6173cf20029410edd
openswan-doc-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 8ad9bccddd942ca2b23292ba8fbb93be
SHA-256: 961f0c1bc35d5705afb3462c79560d838fb16a7cfd808cdf007e5b6dcae2319f
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
openswan-2.6.32-20.el6_4.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: d740abd7b54199c5ff252ce4a1ab437a
SHA-256: 79e931620b3f4ba074b2aa2beab7ecdde5ffddbd3af2a304dbaa3002a22841ed
 
x86_64:
openswan-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: f5f2646608efe2a5f14f75a85a1b31c8
SHA-256: 2117f32b1e35552b5eaa91db7043454c7e1b083ecc5d5358cb3ee2c3141d2e31
openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: ee82850a8e097e7949d08f775fe766f3
SHA-256: a3706b9bf1a63bd6bf7803018b695b8bd45900e0338856f6173cf20029410edd
openswan-doc-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: 8ad9bccddd942ca2b23292ba8fbb93be
SHA-256: 961f0c1bc35d5705afb3462c79560d838fb16a7cfd808cdf007e5b6dcae2319f
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
openswan-2.6.32-20.el6_4.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: d740abd7b54199c5ff252ce4a1ab437a
SHA-256: 79e931620b3f4ba074b2aa2beab7ecdde5ffddbd3af2a304dbaa3002a22841ed
 
IA-32:
openswan-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHBA-2013:1743
    MD5: 9ffa6ba45ffbf809c6a66f688abc2151
SHA-256: eb994d4778f5994416884c66c7e786b7a306d95b563c4dbc3cf2bfa179965551
openswan-debuginfo-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHBA-2013:1743
    MD5: c40b3456dadad0e65028432c183807be
SHA-256: 4cb9639348b32055943f06f65dddfa4d2dbb28380ee5c70b64b9716291064f9f
openswan-doc-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHBA-2013:1743
    MD5: 3b7cfcff163d6c4f4787bb7e71c34b9e
SHA-256: b43fc1021fe0e99841731304f318da325ad396d0ccd7d234f4658ba5d0a67c9c
 
PPC:
openswan-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHBA-2013:1743
    MD5: 83f2c68c42988d618b3349464b992761
SHA-256: bd9a1460ee8ebd4493f40da01a43e53e6aad62c5c58e3e29de736200d420b0b5
openswan-debuginfo-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHBA-2013:1743
    MD5: 6e133318a06b4db89deeb9b39aebf388
SHA-256: f543d170f7f9b7c02b49a02365fd3d4638599ee287b2550b3c8e84d09d695b62
openswan-doc-2.6.32-20.el6_4.ppc64.rpm
File outdated by:  RHBA-2013:1743
    MD5: 6392db7a8eee790b1c5de2785d4ee5b7
SHA-256: 9afa992294c584887f3e0c40a97dfb5757e1348eaf646cecdf879a61de949fcc
 
s390x:
openswan-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHBA-2013:1743
    MD5: b4e8d8011a94c93cd538044e57414694
SHA-256: eb68c6e4e32f4fac19400e8e5a9483d14413664dbee38050a656cd3d93ca7422
openswan-debuginfo-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHBA-2013:1743
    MD5: c91273151e5c735614a5bc72dc821d09
SHA-256: b7390f08dda336cf7a677653b7616a06dfd7f47bc4848181109f6c9f3a9a153b
openswan-doc-2.6.32-20.el6_4.s390x.rpm
File outdated by:  RHBA-2013:1743
    MD5: 2b89bb939b46f542a883e8dc85139408
SHA-256: a22432c4e0e7a848e281d4710b3bf2e71ffbb8361f9919caf3a3df71b6033ac9
 
x86_64:
openswan-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: f5f2646608efe2a5f14f75a85a1b31c8
SHA-256: 2117f32b1e35552b5eaa91db7043454c7e1b083ecc5d5358cb3ee2c3141d2e31
openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: ee82850a8e097e7949d08f775fe766f3
SHA-256: a3706b9bf1a63bd6bf7803018b695b8bd45900e0338856f6173cf20029410edd
openswan-doc-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHBA-2013:1743
    MD5: 8ad9bccddd942ca2b23292ba8fbb93be
SHA-256: 961f0c1bc35d5705afb3462c79560d838fb16a7cfd808cdf007e5b6dcae2319f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
openswan-2.6.32-20.el6_4.src.rpm
File outdated by:  RHSA-2014:0185
    MD5: d740abd7b54199c5ff252ce4a1ab437a
SHA-256: 79e931620b3f4ba074b2aa2beab7ecdde5ffddbd3af2a304dbaa3002a22841ed
 
IA-32:
openswan-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 9ffa6ba45ffbf809c6a66f688abc2151
SHA-256: eb994d4778f5994416884c66c7e786b7a306d95b563c4dbc3cf2bfa179965551
openswan-debuginfo-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: c40b3456dadad0e65028432c183807be
SHA-256: 4cb9639348b32055943f06f65dddfa4d2dbb28380ee5c70b64b9716291064f9f
openswan-doc-2.6.32-20.el6_4.i686.rpm
File outdated by:  RHSA-2014:0185
    MD5: 3b7cfcff163d6c4f4787bb7e71c34b9e
SHA-256: b43fc1021fe0e99841731304f318da325ad396d0ccd7d234f4658ba5d0a67c9c
 
x86_64:
openswan-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: f5f2646608efe2a5f14f75a85a1b31c8
SHA-256: 2117f32b1e35552b5eaa91db7043454c7e1b083ecc5d5358cb3ee2c3141d2e31
openswan-debuginfo-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: ee82850a8e097e7949d08f775fe766f3
SHA-256: a3706b9bf1a63bd6bf7803018b695b8bd45900e0338856f6173cf20029410edd
openswan-doc-2.6.32-20.el6_4.x86_64.rpm
File outdated by:  RHSA-2014:0185
    MD5: 8ad9bccddd942ca2b23292ba8fbb93be
SHA-256: 961f0c1bc35d5705afb3462c79560d838fb16a7cfd808cdf007e5b6dcae2319f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

960229 - CVE-2013-2053 Openswan: remote buffer overflow in atodn()


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/