openSUSE-SU-2019:2594-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:2594-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2019:2594-1
Related
Published
2019-11-30T19:16:42Z
Modified
2019-11-30T19:16:42Z
Summary
Security update for strongswan
Details

This update for strongswan fixes the following issues:

Security issues fixed:

  • CVE-2018-5388: Fixed a buffer underflow which may allow to a remote attacker with local user credentials to resource exhaustion and denial of service while reading from the socket (bsc#1094462).
  • CVE-2018-10811: Fixed a denial of service during the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF (bsc#1093536).
  • CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin which might lead to authorization bypass (bsc#1107874).
  • CVE-2018-17540: Fixed an improper input validation in gmp plugin (bsc#1109845).

This update was imported from the SUSE:SLE-15:Update update project.

References

Affected packages

openSUSE:Leap 15.0 / strongswan

Package

Name
strongswan
Purl
pkg:rpm/opensuse/strongswan&distro=openSUSE%20Leap%2015.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.6.0-lp150.3.3.1

Ecosystem specific

{
    "binaries": [
        {
            "strongswan-hmac": "5.6.0-lp150.3.3.1",
            "strongswan-nm": "5.6.0-lp150.3.3.1",
            "strongswan-doc": "5.6.0-lp150.3.3.1",
            "strongswan-mysql": "5.6.0-lp150.3.3.1",
            "strongswan-libs0": "5.6.0-lp150.3.3.1",
            "strongswan": "5.6.0-lp150.3.3.1",
            "strongswan-sqlite": "5.6.0-lp150.3.3.1",
            "strongswan-ipsec": "5.6.0-lp150.3.3.1"
        }
    ]
}