The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key
exchange protocols in conjunction with the native NETKEY IPsec stack of the
Linux kernel.
Updated to release 5.7.1 Security fix for: - CVE-2018-16151 - CVE-2018-16152
* Thu Oct 4 2018 Mikhail Zabaluev - 5.7.1-1
- Updated to 5.7.1
- Resolves rhbz#1635872 CVE-2018-16152
- Resolves rhbz#1635875 CVE-2018-16151
[ 1 ] Bug #1635875 - CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635875
[ 2 ] Bug #1635872 - CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635872
su -c 'dnf upgrade --advisory FEDORA-2018-a0d22c2a21' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
FEDORA-2018-a0d22c2a21
2018-10-30 17:13:37.317708
Product : Fedora 29
Version : 5.7.1
Release : 1.fc29
URL : https://www.strongswan.org/
Summary : An OpenSource IPsec-based VPN and TNC solution
Description :
The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key
exchange protocols in conjunction with the native NETKEY IPsec stack of the
Linux kernel.
Updated to release 5.7.1 Security fix for: - CVE-2018-16151 - CVE-2018-16152
* Thu Oct 4 2018 Mikhail Zabaluev - 5.7.1-1
- Updated to 5.7.1
- Resolves rhbz#1635872 CVE-2018-16152
- Resolves rhbz#1635875 CVE-2018-16151
[ 1 ] Bug #1635875 - CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635875
[ 2 ] Bug #1635872 - CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635872
su -c 'dnf upgrade --advisory FEDORA-2018-a0d22c2a21' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org