UbuntuUpdates.org

Package "strongswan"

Name: strongswan

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • standalone IPsec client
  • strongSwan IPsec client, systemd support
  • strongSwan plugin to interact with NetworkManager
  • strongSwan IPsec client, pki command

Latest version: 5.6.2-1ubuntu2.5
Release: bionic (18.04)
Level: updates
Repository: universe

Links



Other versions of "strongswan" in Bionic

Repository Area Version
base main 5.6.2-1ubuntu2
base universe 5.6.2-1ubuntu2
security universe 5.6.2-1ubuntu2.3
security main 5.6.2-1ubuntu2.3
updates main 5.6.2-1ubuntu2.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 5.6.2-1ubuntu2.5 2020-01-20 18:08:15 UTC

  strongswan (5.6.2-1ubuntu2.5) bionic; urgency=medium

  * d/p/lp-1772705-charon-nm-Fix-building-list-of-DNS-MDNS-servers-with.patch:
    fix charon-nm pushing random DNS servers (LP: #1772705)

 -- Christian Ehrhardt <email address hidden> Tue, 12 Nov 2019 12:32:51 +0100

Source diff to previous version
1772705 IKEv2 VPN connections fail to use DNS servers provided by the server

Version: 5.6.2-1ubuntu2.4 2019-01-08 19:06:32 UTC

  strongswan (5.6.2-1ubuntu2.4) bionic; urgency=medium

  * fix stroke and lookip execution in containers (LP: #1780534). Binaries
    need to be able to read map and execute themselves
    - d/usr.lib.ipsec.lookip: add rmix to own binary
    - d/usr.lib.ipsec.stroke: add rmix to own binary
  * d/usr.lib.ipsec.charon: allow CLUSTERIP for ha plugin (LP: #1773956)

 -- Christian Ehrhardt <email address hidden> Wed, 12 Dec 2018 15:52:43 +0100

Source diff to previous version
1780534 Default usr.lib.ipsec.stroke profile causes segfault for 'ipsec status'
1773956 [apparmor] missing entry for CLUSTERIP (used by strongswan HA plugin)

Version: 5.6.2-1ubuntu2.3 2018-10-01 19:07:08 UTC

  strongswan (5.6.2-1ubuntu2.3) bionic-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
      buffer overflow with very small RSA keys in
      src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c.
    - CVE-2018-17540

 -- Marc Deslauriers <email address hidden> Wed, 26 Sep 2018 14:36:02 -0400

Source diff to previous version
CVE-2018-17540 RESERVED

Version: 5.6.2-1ubuntu2.2 2018-09-25 15:07:15 UTC

  strongswan (5.6.2-1ubuntu2.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-5.6.1-5.6.3_gmp-pkcs1-verify.patch: don't
      parse PKCS1 v1.5 RSA signatures to verify them in
      src/libstrongswan/plugins/gmp/gmp_rsa_private_key.c,
      src/libstrongswan/plugins/gmp/gmp_rsa_public_key.c.
    - CVE-2018-16151
    - CVE-2018-16152
  * SECURITY UPDATE: remote denial of service
    - debian/patches/strongswan-5.5.0-5.6.2_skeyseed_init.patch: properly
      initialize variable in src/libcharon/sa/ikev2/keymat_v2.c.
    - CVE-2018-10811
  * SECURITY UPDATE: DoS in stroke plugin
    - debian/patches/strongswan-5.1.2-5.6.2_stroke_msg_len.patch: ensure a
      minimum message length in
      src/libcharon/plugins/stroke/stroke_socket.c.
    - CVE-2018-5388

 -- Marc Deslauriers <email address hidden> Tue, 18 Sep 2018 11:03:06 +0200

CVE-2018-16151 RESERVED
CVE-2018-16152 RESERVED
CVE-2018-10811 strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-5388 In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion an



About   -   Send Feedback to @ubuntu_updates