Debian alert DLA-2909-1 (strongswan)
From: | Utkarsh Gupta <utkarsh@debian.org> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 2909-1] strongswan security update | |
Date: | Fri, 04 Feb 2022 00:59:32 +0530 | |
Message-ID: | <CAPP0f954+GKmn0YKWJQD5To2iuyet0HC=RiqPwTshnGF6He=XQ@mail.gmail.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2909-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta February 03, 2022 https://wiki.debian.org/LTS - ----------------------------------------------------------------------- Package : strongswan Version : 5.5.1-4+deb9u6 CVE ID : CVE-2021-45079 Zhuowei Zhang discovered a bug in the EAP authentication client code of strongSwan, an IKE/IPsec suite, that may allow to bypass the client and in some scenarios even the server authentication, or could lead to a denial-of-service attack. For Debian 9 stretch, this problem has been fixed in version 5.5.1-4+deb9u6. We recommend that you upgrade your strongswan packages. For the detailed security status of strongswan please refer to its security tracker page at: https://security-tracker.debian.org/tracker/strongswan Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmH8Ez8ACgkQgj6WdgbD S5YhoA/9HzKG6ZNv9dVLxMGgu32xp1Ju6mdxSPFKFfXYO9rZlTPM2Ov0To3heiaP 7kmjGf81xwexZhodGo9rnaRhIzJc6f9OnU9HgH/YD0I6Nw7E/Y9liMJ3hTTvv5iW LMm9RSwLmZXagm1XowiKpbTGvpfdegXZSkhAxLJG1AQOVNglSiEQJYn5YqcVtFKY 6+s/Bl845RIVHLRFpyt2ODwTqBohM1szUhItI5kbjdbL3lBVORSZ3LC4ydfwC/HY 43dfrHKfBj0xXfqobP0W6NJagBrYJs1doR2pMMWpv+7FQZYu+hK8FaEgqHa6N8f1 aKfQrpZ+0njgPsJogmtwwWCvENepMqcNrzVutNKgsK4VAW4k+W6/fmopmdhaYwZB 02OAkQ5d5snLYbrLZnl1rdjoEn+HlDAT7T572tQkFvclX3BpLyBRUB2KWkPqmgva /CWavHy6utgVd6b2UuO0FpDdv17JJyUVT+2o5TkAp+HNk9t3TIzPqsyTQWVesvct Hp5z5W+ayYARuH6CFz5RzSm6pcaV7fFEBWuOjmeYCMuU+OYbzH0Z0NyyRVbrTxid 53p+0nF5qRqgzjiy9YyjHFJtHGNJ14V1262tVkAh487hEN8FIjBBLwijUreIMWmu hNfLGodlYwflo+GCE+usy/07KtulHrLlEmTgPWYMe/Y015dZ9jA= =OmzZ -----END PGP SIGNATURE-----