The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.
Security Fix(es):
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.(CVE-2021-45079)
{ "severity": "Critical" }
{ "src": [ "strongswan-5.7.2-12.oe2203.src.rpm" ], "aarch64": [ "strongswan-debugsource-5.7.2-12.oe2203.aarch64.rpm", "strongswan-libipsec-5.7.2-12.oe2203.aarch64.rpm", "strongswan-charon-nm-5.7.2-12.oe2203.aarch64.rpm", "strongswan-debuginfo-5.7.2-12.oe2203.aarch64.rpm", "strongswan-sqlite-5.7.2-12.oe2203.aarch64.rpm", "strongswan-tnc-imcvs-5.7.2-12.oe2203.aarch64.rpm", "strongswan-5.7.2-12.oe2203.aarch64.rpm" ], "x86_64": [ "strongswan-tnc-imcvs-5.7.2-12.oe2203.x86_64.rpm", "strongswan-5.7.2-12.oe2203.x86_64.rpm", "strongswan-debugsource-5.7.2-12.oe2203.x86_64.rpm", "strongswan-charon-nm-5.7.2-12.oe2203.x86_64.rpm", "strongswan-debuginfo-5.7.2-12.oe2203.x86_64.rpm", "strongswan-libipsec-5.7.2-12.oe2203.x86_64.rpm", "strongswan-sqlite-5.7.2-12.oe2203.x86_64.rpm" ] }