- -----------------------------------------------------------------------
Debian LTS Advisory DLA-2909-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
February 03, 2022                           https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : strongswan
Version        : 5.5.1-4+deb9u6
CVE ID         : CVE-2021-45079

Zhuowei Zhang discovered a bug in the EAP authentication client code
of strongSwan, an IKE/IPsec suite, that may allow to bypass the client
and in some scenarios even the server authentication, or could lead to
a denial-of-service attack.

For Debian 9 stretch, this problem has been fixed in version
5.5.1-4+deb9u6.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/strongswan

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2909-1: strongswan security update

February 3, 2022
Zhuowei Zhang discovered a bug in the EAP authentication client code of strongSwan, an IKE/IPsec suite, that may allow to bypass the client and in some scenarios even the server au...

Summary

For Debian 9 stretch, this problem has been fixed in version
5.5.1-4+deb9u6.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/strongswan

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : strongswan
Version : 5.5.1-4+deb9u6
CVE ID : CVE-2021-45079

Related News