--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-61df554bb1
2018-10-15 10:46:15.107461
--------------------------------------------------------------------------------Name        : strongswan
Product     : Fedora 28
Version     : 5.7.1
Release     : 1.fc28
URL         : https://www.strongswan.org/
Summary     : An OpenSource IPsec-based VPN and TNC solution
Description :
The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key
exchange protocols in conjunction with the native NETKEY IPsec stack of the
Linux kernel.

--------------------------------------------------------------------------------Update Information:

Updated to release 5.7.1  Security fix for:  - CVE-2018-16151 - CVE-2018-16152
--------------------------------------------------------------------------------ChangeLog:

* Thu Oct  4 2018 Mikhail Zabaluev  - 5.7.1-1
- Updated to 5.7.1
- Resolves rhbz#1635872 CVE-2018-16152
- Resolves rhbz#1635875 CVE-2018-16151
* Tue May 29 2018 Mikhail Zabaluev  - 5.6.3-1
- New version 5.6.3
* Thu May 24 2018 Paul Wouters  - 5.6.2-6
- Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c
* Thu May 24 2018 Paul Wouters  - 5.6.2-5
- Resolves rhbz#1574939 IKEv2 VPN connections fail to use DNS servers provided by the server
- Resolves rhbz#1449875 Strongswan on epel built without the sql plugin but with the sqlite plugin
* Sun May 20 2018 Mikhail Zabaluev  - 5.6.2-3
- Move eap-radius, sqlite, and pkcs7 plugins out of tnc-imcvs, added package
  sqlite (#1579945)
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1635875 - CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1635875
  [ 2 ] Bug #1635872 - CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1635872
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-61df554bb1' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Fedora 28: strongswan Security Update 2018-61df554bb1

October 15, 2018
Updated to release 5.7.1 Security fix for: - CVE-2018-16151 - CVE-2018-16152

Summary

The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key

exchange protocols in conjunction with the native NETKEY IPsec stack of the

Linux kernel.

Updated to release 5.7.1 Security fix for: - CVE-2018-16151 - CVE-2018-16152

* Thu Oct 4 2018 Mikhail Zabaluev - 5.7.1-1

- Updated to 5.7.1

- Resolves rhbz#1635872 CVE-2018-16152

- Resolves rhbz#1635875 CVE-2018-16151

* Tue May 29 2018 Mikhail Zabaluev - 5.6.3-1

- New version 5.6.3

* Thu May 24 2018 Paul Wouters - 5.6.2-6

- Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c

* Thu May 24 2018 Paul Wouters - 5.6.2-5

- Resolves rhbz#1574939 IKEv2 VPN connections fail to use DNS servers provided by the server

- Resolves rhbz#1449875 Strongswan on epel built without the sql plugin but with the sqlite plugin

* Sun May 20 2018 Mikhail Zabaluev - 5.6.2-3

- Move eap-radius, sqlite, and pkcs7 plugins out of tnc-imcvs, added package

sqlite (#1579945)

[ 1 ] Bug #1635875 - CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1635875

[ 2 ] Bug #1635872 - CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1635872

su -c 'dnf upgrade --advisory FEDORA-2018-61df554bb1' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

FEDORA-2018-61df554bb1 2018-10-15 10:46:15.107461 Product : Fedora 28 Version : 5.7.1 Release : 1.fc28 URL : https://www.strongswan.org/ Summary : An OpenSource IPsec-based VPN and TNC solution Description : The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel. Updated to release 5.7.1 Security fix for: - CVE-2018-16151 - CVE-2018-16152 * Thu Oct 4 2018 Mikhail Zabaluev - 5.7.1-1 - Updated to 5.7.1 - Resolves rhbz#1635872 CVE-2018-16152 - Resolves rhbz#1635875 CVE-2018-16151 * Tue May 29 2018 Mikhail Zabaluev - 5.6.3-1 - New version 5.6.3 * Thu May 24 2018 Paul Wouters - 5.6.2-6 - Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c * Thu May 24 2018 Paul Wouters - 5.6.2-5 - Resolves rhbz#1574939 IKEv2 VPN connections fail to use DNS servers provided by the server - Resolves rhbz#1449875 Strongswan on epel built without the sql plugin but with the sqlite plugin * Sun May 20 2018 Mikhail Zabaluev - 5.6.2-3 - Move eap-radius, sqlite, and pkcs7 plugins out of tnc-imcvs, added package sqlite (#1579945) [ 1 ] Bug #1635875 - CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1635875 [ 2 ] Bug #1635872 - CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1635872 su -c 'dnf upgrade --advisory FEDORA-2018-61df554bb1' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 28
Version : 5.7.1
Release : 1.fc28
URL : https://www.strongswan.org/
Summary : An OpenSource IPsec-based VPN and TNC solution

Related News