USN-8196-1 fixed vulnerabilities in strongSwan. This update provides the corresponding update to Ubuntu 26.04 LTS.
Original advisory details:
Haruto Kimura discovered that strongSwan incorrectly handled the supported_versions extension in TLS. A remote attacker could possibly use this issue to cause strongSwan to stop responding, resulting in a denial of service. (CVE-2026-35328)
Haruto Kimura discovered that strongSwan incorrectly handled certain encrypted PKCS#7 containers. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35329)
Lukas Johannes Moeller discovered that strongSwan incorrectly handled certain EAP-SIM/AKA attributes. A remote attacker could use this issue to cause strongSwan to stop responding, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-35330)
Haruto Kimura discovered that strongSwan incorrectly handled processing of X.509 name constraints. A remote attacker could possibly use this issue to bypass excluded name constraints. (CVE-2026-35331)
Haruto Kimura discovered that strongSwan incorrectly processed ECDH public values. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35332)
Lukas Johannes Moeller discovered that strongSwan incorrectly handled certain RADIUS attributes. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35333)
Ryo Shimada discovered that strongSwan incorrectly handled RSA decryption. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35334)
{
"binaries": [
{
"binary_name": "charon-cmd",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "charon-systemd",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "libcharon-extauth-plugins",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "libcharon-extra-plugins",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "libstrongswan",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "libstrongswan-extra-plugins",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "libstrongswan-standard-plugins",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-charon",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-libcharon",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-nm",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-pki",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-starter",
"binary_version": "6.0.4-1ubuntu3"
},
{
"binary_name": "strongswan-swanctl",
"binary_version": "6.0.4-1ubuntu3"
}
],
"availability": "No subscription required"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8196-2.json"
{
"ecosystem": "Ubuntu:26.04",
"cves": [
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2026-35328"
},
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2026-35329"
},
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2026-35330"
},
{
"id": "CVE-2026-35331",
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2026-35332",
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2026-35333"
},
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2026-35334"
}
]
}