[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1522-1] strongswan security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : strongswan
Version        : 5.2.1-6+deb8u7
CVE ID         : CVE-2018-16151 CVE-2018-16152


Sze Yiu Chau and his team from Purdue University and The University of
Iowa found several security issues in the gmp plugin for strongSwan,
an IKE/IPsec suite.

CVE-2018-16151

    The OID parser in the ASN.1 code in gmp allows any number of random
    bytes after a valid OID.

CVE-2018-16152

    The algorithmIdentifier parser in the ASN.1 code in gmp doesn't
    enforce a NULL value for the optional parameter which is not used
    with any PKCS#1 algorithm.

For Debian 8 "Jessie", these problems have been fixed in version
5.2.1-6+deb8u7.

We recommend that you upgrade your strongswan packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=lFhg
-----END PGP SIGNATURE-----


Reply to: