Deutsch   English   Français   Italiano  
<FdBBD-ctmq-3@gated-at.bofh.it>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod
From: Yves-Alexis Perez <corsac@debian.org>
Newsgroups: linux.debian.announce.security
Subject: [SECURITY] [DSA 5249-1] strongswan security update
Date: Thu, 06 Oct 2022 18:10:01 +0200
Message-ID: <FdBBD-ctmq-3@gated-at.bofh.it>
X-Mailbox-Line: From debian-security-announce-request@lists.debian.org  Thu Oct  6 16:08:47 2022
Old-Return-Path: <corsac@corsac.net>
X-Amavis-Spam-Status: No, score=-10.629 tagged_above=-10000 required=5.3
	tests=[BAYES_00=-2, DIGITS_LETTERS=1, FOURLA=0.1,
	FVGT_m_MULTI_ODD=0.02, HEADER_FROM_DIFFERENT_DOMAINS=0.25,
	LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_NONE=-0.0001,
	UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
X-Policyd-Weight: NOT_IN_SBL_XBL_SPAMHAUS=-1.5 CL_IP_EQ_HELO_IP=-2 (check from: .corsac. - helo: .smtp1-g21.free. - helo-domain: .free.)  FROM/MX_MATCHES_NOT_HELO(DOMAIN)=0; rate: -3.5
X-Debian: PGP check passed for security officers
Priority: urgent
Reply-To: debian-security-announce-request@lists.debian.org
X-Mailing-List: <debian-security-announce@lists.debian.org> archive/latest/4147
List-ID: <debian-security-announce.lists.debian.org>
List-URL: <http://lists.debian.org/debian-security-announce/>
List-Archive: https://lists.debian.org/msgid-search/633efd48.a0080.5d83e045@scapa.corsac.net
Approved: robomod@news.nic.it
Lines: 47
Organization: linux.* mail to news gateway
Sender: robomod@news.nic.it
X-Original-Date: Thu, 06 Oct 2022 18:07:36 +0200
X-Original-Message-ID: <633efd48.a0080.5d83e045@scapa.corsac.net>
Bytes: 3695

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5249-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
October 06, 2022                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : strongswan
CVE ID         : CVE-2022-40617
Debian Bug     : 1021271

Lahav Schlesinger discovered a vulnerability in the revocation plugin of
strongSwan, an IKE/IPsec suite.

The revocation plugin uses OCSP URIs and CRL distribution points (CDP) which
come from certificates provided by the remote endpoint. The plugin didn't check
for the certificate chain of trust before using those URIs, so an attacker
could provided a crafted certificate containing URIs pointing to servers under
their control, potentially leading to denial-of-service attacks.

For the stable distribution (bullseye), this problem has been fixed in
version 5.9.1-1+deb11u3.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAmM+/E8ACgkQ3rYcyPpX
RFuyrAgAyR3Yf/msI5VQJglDsHnsF5xqMCCJOOG6KTr1fbyYWIFoE44jT9Pxo7s+
NTJxpEpiwTO0DR2FLpIxZ5lMYQYFDeim7srWJ6fzhy+5KZl/t8yx7yHdmgk76J06
KxhSBrB6ydxxKlPbfmy1OUCs4zqb7tWrkCOFuy1Yimw/vLQg1t2NbiDMuiI+tU4f
+J1pnx6c9GfqlyhDVG1tM1QR+93DziQ0TWewIqpvHDb8y7THQ1L/uC0diHg9om0j
DGKCVbAP8NgKy91dfOBId4lYSzZSZo7KfNp47a3YX5qPIQ4ZkCcle96o2HSQdOoQ
4FmXznvb71KSnoejZAw+kw7uX0dEmQ==
=u1OO
-----END PGP SIGNATURE-----