Bug 10126

Summary: openswan new security issue CVE-2013-2053
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: critical    
Priority: Normal CC: sysadmin-bugs, tmb
Version: 3Keywords: validated_update
Target Milestone: ---   
Hardware: i586   
OS: Linux   
URL: http://lwn.net/Vulnerabilities/550931/
Whiteboard: MGA2TOO has_procedure mga2-32-ok mga2-64-ok mga3-32-ok mga3-64-ok
Source RPM: openswan-2.6.28-4.mga3.src.rpm CVE:
Status comment:

Description David Walser 2013-05-16 19:43:29 CEST
RedHat has issued an advisory on May 15:
https://rhn.redhat.com/errata/RHSA-2013-0827.html

Patches added in Cauldron, Mageia 2, and Mageia 1 SVN.

I'll push to updates_testing once Mageia 3 has branched.

Reproducible: 

Steps to Reproduce:
David Walser 2013-05-16 19:44:00 CEST

Whiteboard: (none) => MGA3TOO, MGA2TOO

Comment 1 David Walser 2013-05-24 18:55:19 CEST
Patched packages uploaded for Mageia 2, Mageia 3, and Cauldron.

Advisory:
========================

Updated openswan packages fix security vulnerability:

A buffer overflow flaw was found in Openswan. If Opportunistic Encryption
were enabled ("oe=yes" in "/etc/ipsec.conf") and an RSA key configured, an
attacker able to cause a system to perform a DNS lookup for an
attacker-controlled domain containing malicious records (such as by sending
an email that triggers a DKIM or SPF DNS record lookup) could cause
Openswan's pluto IKE daemon to crash or, potentially, execute arbitrary
code with root privileges. With "oe=yes" but no RSA key configured, the
issue can only be triggered by attackers on the local network who can
control the reverse DNS entry of the target system. Opportunistic
Encryption is disabled by default (CVE-2013-2053).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
https://rhn.redhat.com/errata/RHSA-2013-0827.html
========================

Updated packages in core/updates_testing:
========================
openswan-2.6.28-2.2.mga2
openswan-doc-2.6.28-2.2.mga2
openswan-2.6.28-5.mga3
openswan-doc-2.6.28-5.mga3

from Source RPMs:
openswan-2.6.28-2.2.mga2.src.rpm
openswan-2.6.28-5.mga3.src.rpm

Version: Cauldron => 3
Whiteboard: MGA3TOO, MGA2TOO => MGA2TOO

Comment 2 David Walser 2013-05-24 18:56:22 CEST
Assigning to QA.

Advisory:
========================

Updated openswan packages fix security vulnerability:

A buffer overflow flaw was found in Openswan. If Opportunistic Encryption
were enabled ("oe=yes" in "/etc/ipsec.conf") and an RSA key configured, an
attacker able to cause a system to perform a DNS lookup for an
attacker-controlled domain containing malicious records (such as by sending
an email that triggers a DKIM or SPF DNS record lookup) could cause
Openswan's pluto IKE daemon to crash or, potentially, execute arbitrary
code with root privileges. With "oe=yes" but no RSA key configured, the
issue can only be triggered by attackers on the local network who can
control the reverse DNS entry of the target system. Opportunistic
Encryption is disabled by default (CVE-2013-2053).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053
https://rhn.redhat.com/errata/RHSA-2013-0827.html
========================

Updated packages in core/updates_testing:
========================
openswan-2.6.28-2.2.mga2
openswan-doc-2.6.28-2.2.mga2
openswan-2.6.28-5.mga3
openswan-doc-2.6.28-5.mga3

from Source RPMs:
openswan-2.6.28-2.2.mga2.src.rpm
openswan-2.6.28-5.mga3.src.rpm

Assignee: bugsquad => qa-bugs

Comment 3 claire robinson 2013-05-25 13:08:04 CEST
Procedure: https://bugs.mageia.org/show_bug.cgi?id=7095#c7

Whiteboard: MGA2TOO => MGA2TOO has_procedure

Comment 4 claire robinson 2013-05-25 13:35:21 CEST
Testing complete mga3 64 & 32, mga2 64 & 32

Note that this still redirects to chkconfig on mga3

Validating

Advisory & srpms in comment 1

Could sysadmin please push from core/updates_testing to core/updates for mga2 & 3

Thanks!

Keywords: (none) => validated_update
Whiteboard: MGA2TOO has_procedure => MGA2TOO has_procedure mga2-32-ok mga2-64-ok mga3-32-ok mga3-64-ok
CC: (none) => sysadmin-bugs

Comment 5 Thomas Backlund 2013-05-25 21:59:22 CEST
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0157

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED