ELSA-2015-1154 - libreswan security, bug fix and enhancement update
Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2015-06-23 |
Description
[3.12-10.1.0.1]
- add libreswan-oracle.patch to detect Oracle Linux distro
[3.12-10.1]
- Resolves: rhbz#1226407 CVE-2015-3204 libreswan: crafted IKE packet causes daemon restart
[3.12-10]
- Resolves: rhbz#1213652 Support CAVS [updated another prf() free symkey, bogus fips mode fix]
[3.12-9]
- Resolves: rhbz#1213652 Support CAVS [updated to kill another copy of prf()]
- Resolves: rhbz#1208023 Libreswan with IPv6 [updated patch by Jaroslav Aster]
- Resolves: rhbz#1208022 libreswan ignores module blacklist [updated modprobe handling]
[3.12-8]
- Resolves: rhbz#1213652 Support CAVS testing of the PRF/PRF+ functions
[3.12-7]
- Resolves: rhbz#1208022 libreswan ignores module blacklist rules
- Resolves: rhbz#1208023 Libreswan with IPv6 in RHEL7 fails after reboot
- Resolves: rhbz#1211146 pluto crashes in fips mode
[3.12-6]
- Resolves: rhbz#1198650 SELinux context string size limit
- Resolves: rhbz#1198649 Add new option for BSI random requirement
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle Linux 7 (x86_64) | libreswan-3.12-10.1.0.1.el7_1.src.rpm | 102eacb06848871f6fdcf0d647192fd6 | ELBA-2020-4067 |
| libreswan-3.12-10.1.0.1.el7_1.x86_64.rpm | 461026ce8278dd60a5740cadb5041c1d | ELBA-2020-4067 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team