UbuntuUpdates.org

Package "strongswan"

Name: strongswan

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • standalone IPsec client
  • strongSwan IPsec client, systemd support
  • strongSwan plugin to interact with NetworkManager
  • strongSwan IPsec client, pki command

Latest version: 5.6.2-1ubuntu2.9
Release: bionic (18.04)
Level: updates
Repository: universe

Links



Other versions of "strongswan" in Bionic

Repository Area Version
base main 5.6.2-1ubuntu2
base universe 5.6.2-1ubuntu2
security universe 5.6.2-1ubuntu2.9
security main 5.6.2-1ubuntu2.9
updates main 5.6.2-1ubuntu2.9

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.6.2-1ubuntu2.9 2022-10-03 19:07:07 UTC

  strongswan (5.6.2-1ubuntu2.9) bionic-security; urgency=medium

  * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
    - debian/patches/CVE-2022-40617.patch: do online revocation checks only
      after basic trust chain validation in
      src/libstrongswan/credentials/credential_manager.c.
    - CVE-2022-40617

 -- Marc Deslauriers <email address hidden> Tue, 20 Sep 2022 14:10:27 -0400

Source diff to previous version
CVE-2022-40617 RESERVED

Version: 5.6.2-1ubuntu2.8 2022-01-24 20:06:55 UTC

  strongswan (5.6.2-1ubuntu2.8) bionic-security; urgency=medium

  * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages
    - debian/patches/CVE-2021-45079.patch: enforce failure if MSK
      generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c,
      src/libcharon/plugins/eap_md5/eap_md5.c,
      src/libcharon/plugins/eap_radius/eap_radius.c,
      src/libcharon/sa/eap/eap_method.h,
      src/libcharon/sa/ikev2/authenticators/eap_authenticator.c.
    - CVE-2021-45079

 -- Marc Deslauriers <email address hidden> Tue, 11 Jan 2022 07:11:09 -0500

Source diff to previous version

Version: 5.6.2-1ubuntu2.7 2021-10-19 12:06:21 UTC

  strongswan (5.6.2-1ubuntu2.7) bionic-security; urgency=medium

  * SECURITY UPDATE: Integer Overflow in gmp Plugin
    - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with
      negative salt length in
      src/libstrongswan/credentials/keys/signature_params.c,
      src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
    - CVE-2021-41990
  * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache
    - debian/patches/CVE-2021-41991.patch: prevent crash due to integer
      overflow/sign change in
      src/libstrongswan/credentials/sets/cert_cache.c.
    - CVE-2021-41991

 -- Marc Deslauriers <email address hidden> Tue, 12 Oct 2021 13:23:35 -0400

Source diff to previous version
CVE-2021-41990 The gmp plugin in strongSwan before 5.9.4 has a remote integer overflo ...
CVE-2021-41991 The in-memory certificate cache in strongSwan before 5.9.4 has a remot ...

Version: 5.6.2-1ubuntu2.6 2021-06-29 23:06:26 UTC

  strongswan (5.6.2-1ubuntu2.6) bionic; urgency=medium

  * d/control: change dependency relationship between strongswan-charon and
    strongswan-starter so that the charon service is started with the apparmor
    profile applied (LP: #1932197)

 -- Andreas Hasenack <email address hidden> Fri, 18 Jun 2021 19:58:12 +0000

Source diff to previous version
1932197 charon apparmor profile not applied on fresh install

Version: 5.6.2-1ubuntu2.5 2020-01-20 18:08:15 UTC

  strongswan (5.6.2-1ubuntu2.5) bionic; urgency=medium

  * d/p/lp-1772705-charon-nm-Fix-building-list-of-DNS-MDNS-servers-with.patch:
    fix charon-nm pushing random DNS servers (LP: #1772705)

 -- Christian Ehrhardt <email address hidden> Tue, 12 Nov 2019 12:32:51 +0100

1772705 IKEv2 VPN connections fail to use DNS servers provided by the server



About   -   Send Feedback to @ubuntu_updates