Gentoo Linux Security Advisory 201411-7 - A NULL pointer dereference in Openswan may allow remote attackers to cause Denial of Service. Versions less than or equal to 2.6.39-r1 are affected.
a42a973e98382c25ce8f2f55f8d1cc8e767f20f6c33222680bbb0f05b22722b6
Debian Linux Security Advisory 2893-1 - Two vulnerabilities were fixed in Openswan, an IKE/IPsec implementation for Linux.
46c874585db91e02896fab1d9cb81e40f1fbae61ac26f26ca4c2726e58ceecae
Red Hat Security Advisory 2014-0185-01 - Openswan is a free implementation of Internet Protocol Security and Internet Key Exchange. IPsec uses strong cryptography to provide both authentication and encryption services. These services allow you to build secure tunnels through untrusted networks. A NULL pointer dereference flaw was discovered in the way Openswan's IKE daemon processed IKEv2 payloads. A remote attacker could send specially crafted IKEv2 payloads that, when processed, would lead to a denial of service, possibly causing existing VPN connections to be dropped.
eccc6640ef4613c7db016932e69c4b4a49e1a2b3f9de49cf9264b17a21f508c9