|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2019:3266-1 (strongswan)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2019:3266-1: important: Security update for strongswan
Date:  Wed, 11 Dec 2019 15:18:40 +0100 (CET)
Message-ID:  <20191211141840.DB761F79E@maintenance.suse.de>

SUSE Security Update: Security update for strongswan ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:3266-1 Rating: important References: #1009254 #1071853 #1093536 #1094462 #1107874 #1109845 Cross-References: CVE-2018-10811 CVE-2018-16151 CVE-2018-16152 CVE-2018-17540 CVE-2018-5388 Affected Products: SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 7 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server for SAP 12-SP1 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server 12-SP4 SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP1-LTSS SUSE Linux Enterprise Desktop 12-SP4 SUSE Enterprise Storage 5 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has one errata is now available. Description: This update for strongswan provides the following fixes: Security issues fixed: - CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker with local user credentials to resource exhaustion and denial of service while reading from the socket (bsc#1094462). - CVE-2018-10811: Fixed a denial of service during the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF (bsc#1093536). - CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which might lead to authorization bypass (bsc#1107874). - CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845). Other issues addressed: - Fixed some client fails when the scep server URL is used with HTTPS protocol (bsc#1071853). - Reject Diffie-Hellman key exchanges using primes smaller than 1024 bit. - Handle unexpected informational message from SonicWall. (bsc#1009254) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2019-3266=1 - SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2019-3266=1 - SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2019-3266=1 - SUSE Linux Enterprise Server for SAP 12-SP2: zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-3266=1 - SUSE Linux Enterprise Server for SAP 12-SP1: zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-3266=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3266=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3266=1 - SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2019-3266=1 - SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2019-3266=1 - SUSE Linux Enterprise Server 12-SP2-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-3266=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-3266=1 - SUSE Linux Enterprise Server 12-SP1-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-3266=1 - SUSE Linux Enterprise Desktop 12-SP4: zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-3266=1 - SUSE Enterprise Storage 5: zypper in -t patch SUSE-Storage-5-2019-3266=1 Package List: - SUSE OpenStack Cloud 8 (x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE OpenStack Cloud 8 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE OpenStack Cloud 7 (s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE OpenStack Cloud 7 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP3 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP2 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (ppc64le x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server for SAP 12-SP1 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP4 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP3-LTSS (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP3-BCL (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP2-LTSS (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (ppc64le s390x x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Linux Enterprise Server 12-SP1-LTSS (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Desktop 12-SP4 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Linux Enterprise Desktop 12-SP4 (x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 - SUSE Enterprise Storage 5 (noarch): strongswan-doc-5.1.3-26.13.1 - SUSE Enterprise Storage 5 (x86_64): strongswan-5.1.3-26.13.1 strongswan-debugsource-5.1.3-26.13.1 strongswan-hmac-5.1.3-26.13.1 strongswan-ipsec-5.1.3-26.13.1 strongswan-ipsec-debuginfo-5.1.3-26.13.1 strongswan-libs0-5.1.3-26.13.1 strongswan-libs0-debuginfo-5.1.3-26.13.1 References: https://www.suse.com/security/cve/CVE-2018-10811.html https://www.suse.com/security/cve/CVE-2018-16151.html https://www.suse.com/security/cve/CVE-2018-16152.html https://www.suse.com/security/cve/CVE-2018-17540.html https://www.suse.com/security/cve/CVE-2018-5388.html https://bugzilla.suse.com/1009254 https://bugzilla.suse.com/1071853 https://bugzilla.suse.com/1093536 https://bugzilla.suse.com/1094462 https://bugzilla.suse.com/1107874 https://bugzilla.suse.com/1109845 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds