|
|
Subscribe / Log in / New account

Ubuntu alert USN-5651-2 (strongswan)

From:  "Leonidas S. Barbosa" <leo.barbosa@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-5651-2] strongSwan vulnerability
Date:  Mon, 03 Oct 2022 16:58:14 -0300
Message-ID:  <20221003195814.GA3447450@d4rkl41n>

========================================================================== Ubuntu Security Notice USN-5651-2 October 03, 2022 strongswan vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: strongSwan could be made do denial of service if it received a specially crafted certificate. Software Description: - strongswan: IPsec VPN solution Details: USN-5651-1 fixed a vulnerability in strongSwan. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP URIs and and CRL distribution points (CDP) in certificates. A remote attacker could possibly use this issue to initiate IKE_SAs and send crafted certificates that contain URIs pointing to servers under their control, which can lead to a denial-of-service attack. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: libstrongswan 5.3.5-1ubuntu3.8+esm3 strongswan 5.3.5-1ubuntu3.8+esm3 Ubuntu 14.04 ESM: libstrongswan 5.1.2-0ubuntu2.11+esm3 strongswan 5.1.2-0ubuntu2.11+esm3 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5651-2 https://ubuntu.com/security/notices/USN-5651-1 CVE-2022-40617


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds