[USN-3771-1] strongSwan vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Tue Sep 25 14:07:43 UTC 2018


==========================================================================
Ubuntu Security Notice USN-3771-1
September 25, 2018

strongswan vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in strongSwan.

Software Description:
- strongswan: IPsec VPN solution

Details:

It was discovered that strongSwan incorrectly handled IKEv2 key derivation.
A remote attacker could possibly use this issue to cause strongSwan to
crash, resulting in a denial of service. (CVE-2018-10811)

Sze Yiu Chau discovered that strongSwan incorrectly handled parsing OIDs in
the gmp plugin. A remote attacker could possibly use this issue to bypass
authorization. (CVE-2018-16151)

Sze Yiu Chau discovered that strongSwan incorrectly handled certain
parameters fields in the gmp plugin. A remote attacker could possibly use
this issue to bypass authorization. (CVE-2018-16152)

It was discovered that strongSwan incorrectly handled the stroke plugin. A
local administrator could use this issue to cause a denial of service, or
possibly execute arbitrary code. (CVE-2018-5388)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  libstrongswan                   5.6.2-1ubuntu2.2
  strongswan                      5.6.2-1ubuntu2.2

Ubuntu 16.04 LTS:
  libstrongswan                   5.3.5-1ubuntu3.7
  strongswan                      5.3.5-1ubuntu3.7

Ubuntu 14.04 LTS:
  libstrongswan                   5.1.2-0ubuntu2.10
  strongswan                      5.1.2-0ubuntu2.10

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3771-1
  CVE-2018-10811, CVE-2018-16151, CVE-2018-16152, CVE-2018-5388

Package Information:
  https://launchpad.net/ubuntu/+source/strongswan/5.6.2-1ubuntu2.2
  https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.7
  https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.10

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20180925/d1711697/attachment.sig>


More information about the ubuntu-security-announce mailing list