Ubuntu alert USN-7841-1 (strongswan)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7841-1] strongSwan vulnerability | |
| Date: | Mon, 27 Oct 2025 18:18:05 +0000 | |
| Message-ID: | <E1vDRnB-0003Cl-I4@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-7841-1 October 27, 2025 strongswan vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 25.04 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: strongSwan client could be made to crash or run programs if it received specially crafted network traffic. Software Description: - strongswan: IPsec VPN solution Details: Xu Biang discovered that the strongSwan client incorrectly handled EAP-MSCHAPv2 failure requests. If a user or automated system were tricked into connecting to a malicious server, a remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 libstrongswan 6.0.1-6ubuntu4.1 strongswan 6.0.1-6ubuntu4.1 Ubuntu 25.04 libstrongswan 5.9.13-2ubuntu4.25.04.1 strongswan 5.9.13-2ubuntu4.25.04.1 Ubuntu 24.04 LTS libstrongswan 5.9.13-2ubuntu4.24.04.1 strongswan 5.9.13-2ubuntu4.24.04.1 Ubuntu 22.04 LTS libstrongswan 5.9.5-2ubuntu2.4 strongswan 5.9.5-2ubuntu2.4 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7841-1 CVE-2025-62291 Package Information: https://launchpad.net/ubuntu/+source/strongswan/6.0.1-6ub... https://launchpad.net/ubuntu/+source/strongswan/5.9.13-2u... https://launchpad.net/ubuntu/+source/strongswan/5.9.13-2u... https://launchpad.net/ubuntu/+source/strongswan/5.9.5-2ub...
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmj/tzAACgkQcpJm3tlz hgEpBBAAuuSlIEuNeTz4piAxw2mPv9Iq52akarei1CuDj8vZpk3eTDlXr2w0SB7W IGjr+bcU9g2XCuVLBPFm4tV8XZVYazBcHUkf3rT3QIodvfEPzzkd4BZcfFxNXpQB l8ech5zszAzv9GdrV4EU3LZoCtpujNzDlLWgzgpOY3/IB2B4lqKsqoB6Z05zj2ol hqYyjzbxan2i+LS602adPQZnNk81MlOgh94gmtq3XkYDva5hR/0CDX9eBh2dykzH TYfUHIwfA9PUq4pnw20W7GOVt/fZ1414CC39hIDCh72isUwHcdlNX6G05i9XNIV5 sEGADpGDJqZhfJChar+WhUyyfKz5LrmdfvPGolFhE0dUSqxn6jw9ZCROLORcAhqN SNbFEqtLLzhvtuArbSo0fQBVPEkxvMDEwT09WGF0VfKSFCdqF3EwqXfLZm3L0QC0 RjaFpaBlqpolkFOPye75SfQv79sEXEemld4qHN9IfDJTnX/NMMp6Ky04rzku7NrZ kvB/BN/xB7JJD1HcdBtqn/alxbo4XTPwJi9Rn95Aa/6eNd6DDg2MiOuTEB4kpU+i N+3E09lR+PyJoJMa4RBeYWSEf0AJeBkgzrPILcbhli0GsG3cJHbB10woeIvikB+9 wqCnfIQ5i9Z/UB4o22u+Dq+IDQvB4N5jMpN5ADo+DLpkBq9lVM0= =hkuJ -----END PGP SIGNATURE-----
