UbuntuUpdates.org

Package "libcharon-extra-plugins"

Name: libcharon-extra-plugins

Description:

strongSwan charon library (extra plugins)

Latest version: 5.3.5-1ubuntu3.8
Release: xenial (16.04)
Level: updates
Repository: main
Head package: strongswan
Homepage: http://www.strongswan.org

Links


Download "libcharon-extra-plugins"


Other versions of "libcharon-extra-plugins" in Xenial

Repository Area Version
base main 5.3.5-1ubuntu3
security main 5.3.5-1ubuntu3.8

Changelog

Version: 5.3.5-1ubuntu3.8 2018-10-01 19:06:50 UTC

  strongswan (5.3.5-1ubuntu3.8) xenial-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
      buffer overflow with very small RSA keys in
      src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c.
    - CVE-2018-17540

 -- Marc Deslauriers <email address hidden> Wed, 26 Sep 2018 14:38:03 -0400

Source diff to previous version
CVE-2018-17540 RESERVED

Version: 5.3.5-1ubuntu3.7 2018-09-25 15:07:11 UTC

  strongswan (5.3.5-1ubuntu3.7) xenial-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-5.3.1-5.6.0_gmp-pkcs1-verify.patch: don't
      parse PKCS1 v1.5 RSA signatures to verify them in
      src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c,
      src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
    - CVE-2018-16151
    - CVE-2018-16152
  * SECURITY UPDATE: remote denial of service
    - debian/patches/strongswan-5.0.1-5.4.0_skeyseed_init.patch: properly
      initialize variable in src/libcharon/sa/ikev2/keymat_v2.c.
    - CVE-2018-10811
  * SECURITY UPDATE: DoS in stroke plugin
    - debian/patches/strongswan-5.1.2-5.6.2_stroke_msg_len.patch: ensure a
      minimum message length in
      src/libcharon/plugins/stroke/stroke_socket.c.
    - CVE-2018-5388

 -- Marc Deslauriers <email address hidden> Tue, 18 Sep 2018 11:05:18 +0200

Source diff to previous version
CVE-2018-16151 RESERVED
CVE-2018-16152 RESERVED
CVE-2018-10811 strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-5388 In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion an

Version: 5.3.5-1ubuntu3.5 2018-01-03 13:06:25 UTC

  strongswan (5.3.5-1ubuntu3.5) xenial; urgency=medium

  * d/p/ikev1-First-do-PSK-lookups-lp1734207.patch ensure evaluation
    with resolvable hostnames selects the right PSK (LP: #1734207).

 -- Christian Ehrhardt <email address hidden> Mon, 18 Dec 2017 11:22:24 +0100

Source diff to previous version
1734207 Multiple PSKs with dyndns left/rightids doesn't work

Version: 5.3.5-1ubuntu3.4 2017-08-21 14:06:51 UTC
No changelog available yet.
Source diff to previous version

Version: 5.3.5-1ubuntu3.3 2017-05-30 14:06:48 UTC

  strongswan (5.3.5-1ubuntu3.3) xenial-security; urgency=medium

  * SECURITY UPDATE: Insufficient Input Validation in gmp Plugin
    - debian/patches/CVE-2017-9022.patch: make sure the modulus is odd and
      the exponent not zero in
      src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
    - CVE-2017-9022
  * SECURITY UPDATE: Incorrect Handling of CHOICE types in ASN.1 parser and
    x509 plugin
    - debian/patches/CVE-2017-9023.patch: fix CHOICE parsing in
      src/libstrongswan/asn1/asn1_parser.*,
      src/libstrongswan/plugins/x509/x509_cert.c.
    - CVE-2017-9023

 -- Marc Deslauriers <email address hidden> Wed, 24 May 2017 15:03:14 -0400




About   -   Send Feedback to @ubuntu_updates