Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3118-1: strongswan security update

    Date
    123
    Posted By
    Mike Daskalakis reported a denial of service vulnerability in charon, the IKEv2 daemon for strongSwan, an IKE/IPsec suite used to establish IPsec protected links.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3118-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                         Yves-Alexis Perez
    January 05, 2015                       https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : strongswan
    CVE ID         : CVE-2014-9221
    
    Mike Daskalakis reported a denial of service vulnerability in charon,
    the IKEv2 daemon for strongSwan, an IKE/IPsec suite used to establish
    IPsec protected links.
    
    The bug can be triggered by an IKEv2 Key Exchange (KE) payload that
    contains the Diffie-Hellman (DH) group 1025. This identifier is from the
    private-use range and only used internally by libtls for DH groups with
    custom generator and prime (MODP_CUSTOM). As such the instantiated
    method expects that these two values are passed to the constructor. This
    is not the case when a DH object is created based on the group in the KE
    payload. Therefore, an invalid pointer is dereferenced later, which
    causes a segmentation fault.
    
    This means that the charon daemon can be crashed with a single
    IKE_SA_INIT message containing such a KE payload. The starter process
    should restart the daemon after that, but this might increase load on
    the system. Remote code execution is not possible due to this issue, nor
    is IKEv1 affected in charon or pluto.
    
    For the stable distribution (wheezy), this problem has been fixed in
    version 4.5.2-1.5+deb7u6.
    
    For the upcoming stable distribution (jessie), this problem has been
    fixed in version 5.2.1-5.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 5.2.1-5.
    
    We recommend that you upgrade your strongswan packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/40-what-change-are-you-most-excited-about-in-linux-5-9?task=poll.vote&format=json
    40
    radio
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"3","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.