UbuntuUpdates.org

Package "charon-systemd"

Name: charon-systemd

Description:

strongSwan IPsec client, systemd support

Latest version: 5.8.2-1ubuntu3.6
Release: focal (20.04)
Level: security
Repository: universe
Head package: strongswan
Homepage: http://www.strongswan.org

Links


Download "charon-systemd"


Other versions of "charon-systemd" in Focal

Repository Area Version
base universe 5.8.2-1ubuntu3
updates universe 5.8.2-1ubuntu3.6

Changelog

Version: 5.8.2-1ubuntu3.6 2023-11-20 17:06:54 UTC

  strongswan (5.8.2-1ubuntu3.6) focal-security; urgency=medium

  * SECURITY UPDATE: Buffer Overflow When Handling DH Public Values
    - debian/patches/CVE-2023-41913.patch: Validate DH public key to fix
      potential buffer overflow in
      src/charon-tkm/src/tkm/tkm_diffie_hellman.c.
    - CVE-2023-41913

 -- Marc Deslauriers <email address hidden> Tue, 07 Nov 2023 11:46:34 +0200

Source diff to previous version

Version: 5.8.2-1ubuntu3.5 2022-10-03 18:07:22 UTC

  strongswan (5.8.2-1ubuntu3.5) focal-security; urgency=medium

  * SECURITY UPDATE: Using Untrusted URIs for Revocation Checking
    - debian/patches/CVE-2022-40617.patch: do online revocation checks only
      after basic trust chain validation in
      src/libstrongswan/credentials/credential_manager.c.
    - CVE-2022-40617

 -- Marc Deslauriers <email address hidden> Tue, 20 Sep 2022 14:10:02 -0400

Source diff to previous version
CVE-2022-40617 RESERVED

Version: 5.8.2-1ubuntu3.4 2022-01-24 19:07:26 UTC

  strongswan (5.8.2-1ubuntu3.4) focal-security; urgency=medium

  * SECURITY UPDATE: Incorrect Handling of Early EAP-Success Messages
    - debian/patches/CVE-2021-45079.patch: enforce failure if MSK
      generation fails in src/libcharon/plugins/eap_gtc/eap_gtc.c,
      src/libcharon/plugins/eap_md5/eap_md5.c,
      src/libcharon/plugins/eap_radius/eap_radius.c,
      src/libcharon/sa/eap/eap_method.h,
      src/libcharon/sa/ikev2/authenticators/eap_authenticator.c.
    - CVE-2021-45079

 -- Marc Deslauriers <email address hidden> Tue, 11 Jan 2022 07:10:45 -0500

Source diff to previous version

Version: 5.8.2-1ubuntu3.3 2021-10-19 11:06:33 UTC

  strongswan (5.8.2-1ubuntu3.3) focal-security; urgency=medium

  * SECURITY UPDATE: Integer Overflow in gmp Plugin
    - debian/patches/CVE-2021-41990.patch: reject RSASSA-PSS params with
      negative salt length in
      src/libstrongswan/credentials/keys/signature_params.c,
      src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
    - CVE-2021-41990
  * SECURITY UPDATE: Integer Overflow When Replacing Certificates in Cache
    - debian/patches/CVE-2021-41991.patch: prevent crash due to integer
      overflow/sign change in
      src/libstrongswan/credentials/sets/cert_cache.c.
    - CVE-2021-41991

 -- Marc Deslauriers <email address hidden> Tue, 12 Oct 2021 13:22:57 -0400

CVE-2021-41990 The gmp plugin in strongSwan before 5.9.4 has a remote integer overflo ...
CVE-2021-41991 The in-memory certificate cache in strongSwan before 5.9.4 has a remot ...



About   -   Send Feedback to @ubuntu_updates