Package "strongswan"

Name: strongswan


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • strongswan IKEv1 daemon, transitional package
  • strongswan IKEv2 daemon, transitional package
  • strongSwan charon for interaction with NetworkManager
  • strongSwan plugin for AF_ALG Linux crypto API interface

Latest version: 5.1.2-0ubuntu2.11
Release: trusty (14.04)
Level: updates
Repository: universe


Other versions of "strongswan" in Trusty

Repository Area Version
base universe 5.1.2-0ubuntu2
base main 5.1.2-0ubuntu2
security universe 5.1.2-0ubuntu2.11
security main 5.1.2-0ubuntu2.11
updates main 5.1.2-0ubuntu2.11

Packages in group

Deleted packages are displayed in grey.


Version: 5.1.2-0ubuntu2.11 2018-10-01 19:06:44 UTC

  strongswan (5.1.2-0ubuntu2.11) trusty-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-4.4.0-5.7.0_gmp-pkcs1-overflow.patch: fix
      buffer overflow with very small RSA keys in
    - CVE-2018-17540

 -- Marc Deslauriers <email address hidden> Wed, 26 Sep 2018 14:38:31 -0400

Source diff to previous version
CVE-2018-17540 RESERVED

Version: 5.1.2-0ubuntu2.10 2018-09-25 15:07:09 UTC

  strongswan (5.1.2-0ubuntu2.10) trusty-security; urgency=medium

  * SECURITY UPDATE: Insufficient input validation in gmp plugin
    - debian/patches/strongswan-5.0.1-5.3.0_gmp-pkcs1-verify.patch: don't
      parse PKCS1 v1.5 RSA signatures to verify them in
    - debian/patches/chunk_equals_const.patch: backport required function
      to src/libstrongswan/utils/chunk.h.
    - debian/patches/memeq_const.patch: backport required function to
    - CVE-2018-16151
    - CVE-2018-16152
  * SECURITY UPDATE: remote denial of service
    - debian/patches/strongswan-5.0.1-5.4.0_skeyseed_init.patch: properly
      initialize variable in src/libcharon/sa/ikev2/keymat_v2.c.
    - CVE-2018-10811
  * SECURITY UPDATE: DoS in stroke plugin
    - debian/patches/strongswan-5.1.2-5.6.2_stroke_msg_len.patch: ensure a
      minimum message length in
    - CVE-2018-5388

 -- Marc Deslauriers <email address hidden> Tue, 18 Sep 2018 11:06:16 +0200

Source diff to previous version
CVE-2018-16151 RESERVED
CVE-2018-16152 RESERVED
CVE-2018-10811 strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-5388 In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion an

Version: 5.1.2-0ubuntu2.8 2018-04-18 02:06:40 UTC

  strongswan (5.1.2-0ubuntu2.8) trusty; urgency=medium

  * d/control: Add Conflicts from strongswan-starter to openswan to
    avoid file conflict on upgrade. (LP: #1755693)

 -- Trent Lloyd <email address hidden> Wed, 14 Mar 2018 14:50:05 +0800

Source diff to previous version
1755693 strongswan-starter should conflict with openswan due to shared file /usr/sbin/ipsec

Version: 5.1.2-0ubuntu2.7 2017-08-21 14:06:49 UTC
No changelog available yet.
Source diff to previous version

Version: 5.1.2-0ubuntu2.6 2017-05-30 14:06:45 UTC

  strongswan (5.1.2-0ubuntu2.6) trusty-security; urgency=medium

  * SECURITY UPDATE: Insufficient Input Validation in gmp Plugin
    - debian/patches/CVE-2017-9022.patch: make sure the modulus is odd and
      the exponent not zero in
    - CVE-2017-9022
  * SECURITY UPDATE: Incorrect Handling of CHOICE types in ASN.1 parser and
    x509 plugin
    - debian/patches/CVE-2017-9023.patch: fix CHOICE parsing in
    - CVE-2017-9023

 -- Marc Deslauriers <email address hidden> Wed, 24 May 2017 15:04:26 -0400

About   -   Send Feedback to @ubuntu_updates