The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.
Security Fix(es):
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.(CVE-2021-45079)
{
"severity": "Critical"
}{
"x86_64": [
"strongswan-tnc-imcvs-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-debugsource-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-charon-nm-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-debuginfo-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-libipsec-5.7.2-12.oe2203.x86_64.rpm",
"strongswan-sqlite-5.7.2-12.oe2203.x86_64.rpm"
],
"src": [
"strongswan-5.7.2-12.oe2203.src.rpm"
],
"aarch64": [
"strongswan-debugsource-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-libipsec-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-charon-nm-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-debuginfo-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-sqlite-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-tnc-imcvs-5.7.2-12.oe2203.aarch64.rpm",
"strongswan-5.7.2-12.oe2203.aarch64.rpm"
]
}