==========================================================================
Ubuntu Security Notice USN-3301-1
May 30, 2017
strongswan vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
strongSwan could be made to crash or hang if it received specially crafted
network traffic.
Software Description:
– strongswan: IPsec VPN solution
Details:
It was discovered that the strongSwan gmp plugin incorrectly validated RSA
public keys. A remote attacker could use this issue to cause strongSwan to
crash, resulting in a denial of service. (CVE-2017-9022)
It was discovered that strongSwan incorrectly parsed ASN.1 CHOICE types. A
remote attacker could use this issue to cause strongSwan to hang, resulting
in a denial of service. (CVE-2017-9023)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libstrongswan 5.5.1-1ubuntu3.1
strongswan 5.5.1-1ubuntu3.1
Ubuntu 16.10:
libstrongswan 5.3.5-1ubuntu4.3
strongswan 5.3.5-1ubuntu4.3
strongswan-plugin-gmp 5.3.5-1ubuntu4.3
Ubuntu 16.04 LTS:
libstrongswan 5.3.5-1ubuntu3.3
strongswan 5.3.5-1ubuntu3.3
strongswan-plugin-gmp 5.3.5-1ubuntu3.3
Ubuntu 14.04 LTS:
libstrongswan 5.1.2-0ubuntu2.6
strongswan 5.1.2-0ubuntu2.6
strongswan-plugin-gmp 5.1.2-0ubuntu2.6
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3301-1
CVE-2017-9022, CVE-2017-9023
Package Information:
https://launchpad.net/ubuntu/+source/strongswan/5.5.1-1ubuntu3.1
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu4.3
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.3
https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.6
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=OGg2
—–END PGP SIGNATURE—–
—