ALT-BU-2015-2223-1
Branch t7 update bulletin.
Package strongswan updated to version 5.2.2-alt1 for branch t7 in task 138100.
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-04320
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2023-02-15
BDU:2015-04321
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2023-02-15
BDU:2015-09781
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
Modified: 2025-04-11
CVE-2013-6075
The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
- http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch
- http://www.debian.org/security/2012/dsa-2789
- http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html
- http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch
- http://www.debian.org/security/2012/dsa-2789
- http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html
Modified: 2025-04-11
CVE-2013-6076
strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and charon daemon crash) via a crafted IKEv1 fragmentation packet.
Modified: 2025-04-12
CVE-2014-2338
IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html
- http://secunia.com/advisories/57823
- http://www.debian.org/security/2014/dsa-2903
- http://www.securityfocus.com/bid/66815
- http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html
- http://secunia.com/advisories/57823
- http://www.debian.org/security/2014/dsa-2903
- http://www.securityfocus.com/bid/66815
- http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html
Modified: 2025-04-12
CVE-2014-2891
strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html
- http://secunia.com/advisories/59864
- http://www.debian.org/security/2014/dsa-2922
- http://www.securityfocus.com/bid/67212
- http://www.strongswan.org/blog/2014/05/05/strongswan-denial-of-service-vulnerability-%28cve-2014-2891%29.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html
- http://secunia.com/advisories/59864
- http://www.debian.org/security/2014/dsa-2922
- http://www.securityfocus.com/bid/67212
- http://www.strongswan.org/blog/2014/05/05/strongswan-denial-of-service-vulnerability-%28cve-2014-2891%29.html
Modified: 2025-04-12
CVE-2014-9221
strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html
- http://secunia.com/advisories/62071
- http://secunia.com/advisories/62083
- http://secunia.com/advisories/62095
- http://secunia.com/advisories/62663
- http://strongswan.org/blog/2015/01/05/strongswan-5.2.2-released.html
- http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-%28cve-2014-9221%29.html
- http://www.debian.org/security/2015/dsa-3118
- http://www.securityfocus.com/bid/71894
- http://www.ubuntu.com/usn/USN-2450-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html
- http://secunia.com/advisories/62071
- http://secunia.com/advisories/62083
- http://secunia.com/advisories/62095
- http://secunia.com/advisories/62663
- http://strongswan.org/blog/2015/01/05/strongswan-5.2.2-released.html
- http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-%28cve-2014-9221%29.html
- http://www.debian.org/security/2015/dsa-3118
- http://www.securityfocus.com/bid/71894
- http://www.ubuntu.com/usn/USN-2450-1