This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected versions of Fedora. For comments that are specific to the vulnerability please use bugs filed against the "Security Response" product referenced in the "Blocks" field. For more information see: http://fedoraproject.org/wiki/Security/TrackingBugs When creating a Bodhi update request, please use the bodhi submission link noted in the next comment(s). This will include the bug IDs of this tracking bug as well as the relevant top-level CVE bugs. Please also mention the CVE IDs being fixed in the RPM changelog and the Bodhi notes field when available. Please note: this issue affects multiple supported versions of Fedora. Only one tracking bug has been filed; please ensure that it is only closed when all affected versions are fixed. [bug automatically created by: add-tracking-bugs]
Please use the following update submission link to create the Bodhi request for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. Please also ensure that the "Close bugs when update is stable" option remains checked. Bodhi update submission link: https://admin.fedoraproject.org/updates/new/?type_=security&bugs=958122,958125
The whole strongSwan's openssl plug-in code in Fedora 17 and Fedora 18 is in: #ifndef OPENSSL_NO_EC block (is performed only in case ECDSA support is compiled in in the underlying openssl package, and since openssl package in Fedora does not provide support for ECDSA algorithm (no-ecdsa configure option), the affected strongSwan code part can not be reached. Therefore strongswan package versions, shipped with Fedora release of 17 and 18, are NOT affected by the CVE-2013-2944 problem.