Summary: | <net-misc/openswan-2.4.14 <net-misc/strongswan-4.2.14 DoS (CVE-2009-0790) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Eray Aslan <eras> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | minor | CC: | maintainer-needed, mrness, robbat2 | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790 | ||||||
Whiteboard: | B3 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Eray Aslan
![]() Robin, I cc'd you as you did the last bumps for strongswan, maybe you feel like bumping/patching this time, too. All: Please either bump or apply the patches here: http://www.openswan.org/CVE-2009-0790/ Created attachment 187273 [details]
version bump
test on amd64:
- kernel 2.6.28 looks good
- xen DomU kernel 2.6.18 does not work
I've bumped openswan to the new versions. amd64 & x86 teams, please stabilize net-misc/openswan-2.4.14. (In reply to comment #3) > I've bumped openswan to the new versions. > > amd64 & x86 teams, please stabilize net-misc/openswan-2.4.14. > openswan-2.4.14-gentoo.patch fails to apply. (In reply to comment #4) > (In reply to comment #3) > > I've bumped openswan to the new versions. > > > > amd64 & x86 teams, please stabilize net-misc/openswan-2.4.14. > > > > openswan-2.4.14-gentoo.patch fails to apply. > line 54 should be: # RCSID $Id: ipsec.conf.in,v 1.15.2.6 2006-10-19 03:49:46 paul Exp $ unless you plan to change that to reflect the edit. Sorry for the double post. Resynchronize your tree. This issue has been fixed days ago. (In reply to comment #6) > Resynchronize your tree. This issue has been fixed days ago. I synced maybe an hour ago and it still fails here... >>> Source unpacked in /var/tmp/portage/net-misc/openswan-2.4.14/work * Applying openswan-2.4.14-gentoo.patch ... * Failed Patch: openswan-2.4.14-gentoo.patch ! * ( /usr/portage/net-misc/openswan/files/openswan-2.4.14-gentoo.patch ) * * Include in your bugreport the contents of: * * /var/tmp/portage/net-misc/openswan-2.4.14/temp/openswan-2.4.14-gentoo.patch-26405.out I tried to fix it by running cvs update -kb, but cvs seems unable to add flags to existing files, so I've replaced the gentoo.patch with gentoo-fixed.patch (this time added with -kb). Sorry for the troble... Did I mentioned I hate cvs? mrness: fyi for future. if you fail to add a file with -kb the first time, you must do this to fix it: cvs rm -f $file ; cvs ci $file ; cvs add -kb ; repoman commit .... The commit in the middle is not optional. amd64/x86 stable, all arches done. Ready for vote, I vote YES. +*strongswan-4.2.15 (07 Jun 2009) + + 07 Jun 2009; Robert Buchholz <rbu@gentoo.org> +strongswan-4.2.15.ebuild: + Version bump, fixes security bug 264346 and 272276. Remove old warning in + the code, fix dependencies and configure options. Comment in user and group + specification again. Added some TODOs. strongswan is ~arch only. Yes, too. Request filed. FAIL. Closing noglsa, of course. let's track this as open until the glsa for openswan is out. Sure. I apologize, I saw #12 and #13 and thought I had made a mistake, I didn't look hard enough. :( GLSA 200909-05 |