——————————————————————————–
Fedora Update Notification
FEDORA-2018-61df554bb1
2018-10-15 10:46:15.107461
——————————————————————————–
Name : strongswan
Product : Fedora 28
Version : 5.7.1
Release : 1.fc28
URL : http://www.strongswan.org/
Summary : An OpenSource IPsec-based VPN and TNC solution
Description :
The strongSwan IPsec implementation supports both the IKEv1 and IKEv2 key
exchange protocols in conjunction with the native NETKEY IPsec stack of the
Linux kernel.
——————————————————————————–
Update Information:
Updated to release 5.7.1 Security fix for: – CVE-2018-16151 – CVE-2018-16152
——————————————————————————–
ChangeLog:
* Thu Oct 4 2018 Mikhail Zabaluev <mikhail.zabaluev@gmail.com> – 5.7.1-1
– Updated to 5.7.1
– Resolves rhbz#1635872 CVE-2018-16152
– Resolves rhbz#1635875 CVE-2018-16151
* Tue May 29 2018 Mikhail Zabaluev <mikhail.zabaluev@gmail.com> – 5.6.3-1
– New version 5.6.3
* Thu May 24 2018 Paul Wouters <pwouters@redhat.com> – 5.6.2-6
– Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c
* Thu May 24 2018 Paul Wouters <pwouters@redhat.com> – 5.6.2-5
– Resolves rhbz#1574939 IKEv2 VPN connections fail to use DNS servers provided by the server
– Resolves rhbz#1449875 Strongswan on epel built without the sql plugin but with the sqlite plugin
* Sun May 20 2018 Mikhail Zabaluev <mikhail.zabaluev@gmail.com> – 5.6.2-3
– Move eap-radius, sqlite, and pkcs7 plugins out of tnc-imcvs, added package
sqlite (#1579945)
——————————————————————————–
References:
[ 1 ] Bug #1635875 – CVE-2018-16151 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635875
[ 2 ] Bug #1635872 – CVE-2018-16152 strongswan: authentication bypass in verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1635872
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2018-61df554bb1’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org