ALT-BU-2024-8046-1
Branch c9f2 update bulletin.
Package strongswan updated to version 5.9.13-alt0.c9f2.1 for branch c9f2 in task 348309.
Closed vulnerabilities
BDU:2023-02802
Уязвимость демона strongSwan, вызванная целочисленным переполнением (при условии, что кэш сертификатов в памяти полон), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08128
Уязвимость VPN-пакета на базе протокола IPSec strongSwan, вызванная ошибкой в процессе charon-tkm, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-41990
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- FEDORA-2021-0b37146973
- FEDORA-2021-0b37146973
- FEDORA-2021-b3df83339e
- FEDORA-2021-b3df83339e
- FEDORA-2021-95fab6a482
- FEDORA-2021-95fab6a482
- DSA-4989
- DSA-4989
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html
Modified: 2024-11-21
CVE-2021-41991
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- [debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
- [debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
- FEDORA-2021-0b37146973
- FEDORA-2021-0b37146973
- FEDORA-2021-b3df83339e
- FEDORA-2021-b3df83339e
- FEDORA-2021-95fab6a482
- FEDORA-2021-95fab6a482
- DSA-4989
- DSA-4989
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html
Modified: 2024-11-21
CVE-2021-45079
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Modified: 2024-11-21
CVE-2022-40617
strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.
Modified: 2025-01-17
CVE-2023-41913
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
- https://github.com/strongswan/strongswan/releases
- https://github.com/strongswan/strongswan/releases
- FEDORA-2024-6712c699fc
- FEDORA-2024-6712c699fc
- https://security.netapp.com/advisory/ntap-20250117-0003/
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html