The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.
Security Fix(es):
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.(CVE-2021-45079)
{ "severity": "Critical" }
{ "noarch": [ "strongswan-help-5.7.2-8.oe1.noarch.rpm" ], "src": [ "strongswan-5.7.2-8.oe1.src.rpm" ], "aarch64": [ "strongswan-debugsource-5.7.2-8.oe1.aarch64.rpm", "strongswan-5.7.2-8.oe1.aarch64.rpm", "strongswan-debuginfo-5.7.2-8.oe1.aarch64.rpm" ], "x86_64": [ "strongswan-debuginfo-5.7.2-8.oe1.x86_64.rpm", "strongswan-5.7.2-8.oe1.x86_64.rpm", "strongswan-debugsource-5.7.2-8.oe1.x86_64.rpm" ] }
{ "noarch": [ "strongswan-help-5.7.2-8.oe1.noarch.rpm" ], "src": [ "strongswan-5.7.2-8.oe1.src.rpm" ], "aarch64": [ "strongswan-debuginfo-5.7.2-8.oe1.aarch64.rpm", "strongswan-debugsource-5.7.2-8.oe1.aarch64.rpm", "strongswan-5.7.2-8.oe1.aarch64.rpm" ], "x86_64": [ "strongswan-debugsource-5.7.2-8.oe1.x86_64.rpm", "strongswan-5.7.2-8.oe1.x86_64.rpm", "strongswan-debuginfo-5.7.2-8.oe1.x86_64.rpm" ] }
{ "noarch": [ "strongswan-help-5.7.2-9.oe1.noarch.rpm" ], "src": [ "strongswan-5.7.2-9.oe1.src.rpm" ], "aarch64": [ "strongswan-debuginfo-5.7.2-9.oe1.aarch64.rpm", "strongswan-5.7.2-9.oe1.aarch64.rpm", "strongswan-debugsource-5.7.2-9.oe1.aarch64.rpm" ], "x86_64": [ "strongswan-5.7.2-9.oe1.x86_64.rpm", "strongswan-debuginfo-5.7.2-9.oe1.x86_64.rpm", "strongswan-debugsource-5.7.2-9.oe1.x86_64.rpm" ] }