Lucene search

K
suseSuseOPENSUSE-SU-2019:2594-1
HistoryNov 30, 2019 - 12:00 a.m.

Security update for strongswan (important)

2019-11-3000:00:00
lists.opensuse.org
99

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

An update that fixes 5 vulnerabilities is now available.

Description:

This update for strongswan fixes the following issues:

Security issues fixed:

  • CVE-2018-5388: Fixed a buffer underflow which may allow to a remote
    attacker with local user credentials to resource exhaustion and denial
    of service while reading from the socket (bsc#1094462).
  • CVE-2018-10811: Fixed a denial of service during the IKEv2 key
    derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is
    negotiated as PRF (bsc#1093536).
  • CVE-2018-16151,CVE-2018-16152: Fixed multiple flaws in the gmp plugin
    which might lead to authorization bypass (bsc#1107874).
  • CVE-2018-17540: Fixed an improper input validation in gmp plugin
    (bsc#1109845).

This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.0:

    zypper in -t patch openSUSE-2019-2594=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.0noarch< - openSUSE Leap 15.0 (noarch):- openSUSE Leap 15.0 (noarch):.noarch.rpm
openSUSE Leap15.0x86_64< - openSUSE Leap 15.0 (x86_64):- openSUSE Leap 15.0 (x86_64):.x86_64.rpm

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P