The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key exchange protocols in conjunction with the native NETKEY IPsec stack of the Linux kernel.
Security Fix(es):
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.(CVE-2021-45079)
{
"severity": "Critical"
}{
"src": [
"strongswan-5.7.2-8.oe1.src.rpm"
],
"noarch": [
"strongswan-help-5.7.2-8.oe1.noarch.rpm"
],
"x86_64": [
"strongswan-debuginfo-5.7.2-8.oe1.x86_64.rpm",
"strongswan-5.7.2-8.oe1.x86_64.rpm",
"strongswan-debugsource-5.7.2-8.oe1.x86_64.rpm"
],
"aarch64": [
"strongswan-debugsource-5.7.2-8.oe1.aarch64.rpm",
"strongswan-5.7.2-8.oe1.aarch64.rpm",
"strongswan-debuginfo-5.7.2-8.oe1.aarch64.rpm"
]
}
{
"src": [
"strongswan-5.7.2-8.oe1.src.rpm"
],
"noarch": [
"strongswan-help-5.7.2-8.oe1.noarch.rpm"
],
"x86_64": [
"strongswan-debugsource-5.7.2-8.oe1.x86_64.rpm",
"strongswan-5.7.2-8.oe1.x86_64.rpm",
"strongswan-debuginfo-5.7.2-8.oe1.x86_64.rpm"
],
"aarch64": [
"strongswan-debuginfo-5.7.2-8.oe1.aarch64.rpm",
"strongswan-debugsource-5.7.2-8.oe1.aarch64.rpm",
"strongswan-5.7.2-8.oe1.aarch64.rpm"
]
}
{
"src": [
"strongswan-5.7.2-9.oe1.src.rpm"
],
"noarch": [
"strongswan-help-5.7.2-9.oe1.noarch.rpm"
],
"x86_64": [
"strongswan-5.7.2-9.oe1.x86_64.rpm",
"strongswan-debuginfo-5.7.2-9.oe1.x86_64.rpm",
"strongswan-debugsource-5.7.2-9.oe1.x86_64.rpm"
],
"aarch64": [
"strongswan-debuginfo-5.7.2-9.oe1.aarch64.rpm",
"strongswan-5.7.2-9.oe1.aarch64.rpm",
"strongswan-debugsource-5.7.2-9.oe1.aarch64.rpm"
]
}