lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <5b24d4eb.a1082.7b0e6f86@scapa.corsac.net>
Date: Sat, 16 Jun 2018 11:14:19 +0200
From: Yves-Alexis Perez <corsac@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4229-1] strongswan security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4229-1                   security@...ian.org
https://www.debian.org/security/                        Yves-Alexis Perez
June 14, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : strongswan
CVE ID         : CVE-2018-5388 CVE-2018-10811

Two vulnerabilities were discovered in strongSwan, an IKE/IPsec suite.

CVE-2018-5388

    The stroke plugin did not verify the message length when reading from its
    control socket. This vulnerability could lead to denial of service. On
    Debian write access to the socket requires root permission on default
    configuration.

CVE-2018-10811

    A missing variable initialization in IKEv2 key derivation could lead to a
    denial of service (crash of the charon IKE daemon) if the openssl plugin is
    used in FIPS mode and the negotiated PRF is HMAC-MD5.

For the oldstable distribution (jessie), these problems have been fixed
in version 5.2.1-6+deb8u6.

For the stable distribution (stretch), these problems have been fixed in
version 5.5.1-4+deb9u2.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlsk0n4ACgkQ3rYcyPpX
RFsjxQf/fduO/tPZxJEza4JBLLCzPCTgMGAZwOjUWhHAQ/qYQuooMmo4OZIT5Tf1
mMsSDJ0H9AmDTyP4mvmb40St0T4ZpZK+OmPfHUoZMlS2mCN/032qXVYbTA1C/z0N
YdAHp75dDNVHh5Z8LQfJknYOZVIw74GUjsPZg9u+VYNIlnGKbyeC3EMgJry8frZe
gxXCf8pKW2aDOVxrzRVitgbIMCFT0kCQYLb2qf/SvUp/IxAyjeDy6hnfVfvWFkxW
5tNRSTrW1Xcl0Eeh30LfN2FgZAYmfT+8BCgjszSVz3xh5dYaqFv+LMTMZu2n2D3n
/HvX/mDRrmN+UsRrpZfJyx8snvFaKQ==
=sH3t
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ