strongSwan Vulnerability (CVE-2021-45079)
Posted by tobias |
A vulnerability in the EAP client implementation was discovered in strongSwan. All versions since 4.1.2 are affected.
Posted by tobias |
A vulnerability in the EAP client implementation was discovered in strongSwan. All versions since 4.1.2 are affected.
Posted by tobias |
A denial-of-service vulnerability in the in-memory certificate cache was discovered in strongSwan. All versions since 4.2.10 are affected.
Posted by tobias |
A denial-of-service vulnerability in the gmp plugin was discovered in strongSwan. All versions since 5.6.1 are affected.
Posted by tobias |
A potential authorization bypass vulnerability in the gmp plugin was discovered in strongSwan. All versions are affected in certain configurations.
Posted by tobias |
We are happy to announce the release of strongSwan 5.6.3, which improves certificate chain validation, updates the DHCP plugin, allows forcing the local termination of IKE_SAs, supports trap policies with virtual IPs, and fixes two potential DoS vulnerabilities and several other issues.
Posted by tobias |
A denial-of-service vulnerability in the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF was discovered, all strongSwan versions since 5.0.1 may be affected.
Posted by tobias |
A denial-of-service vulnerability in the stroke plugin was discovered in strongSwan. All versions are affected in certain configurations.
Posted by tobias |
We are happy to announce the release of strongSwan 5.6.2 which includes rekeying and MOBIKE improvements, supports accessing certificates in a TPM 2.0, and fixes a DoS vulnerability and several other issues.
Posted by tobias |
A denial-of-service vulnerability in the parser for RSASSA-PSS signatures was discovered in strongSwan 5.6.1.
Posted by tobias |
We are happy to announce the release of strongSwan 5.6.1 which removes deprecated algorithms from default proposals, supports RSASSA-PSS signatures, and brings several other new features and fixes.