blob: 5d588a5c4c5bb3e72f8bb94362d1612542b5fa23 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201412-26">
<title>strongSwan: Multiple Vulnerabilities</title>
<synopsis>Two vulnerabilities have been found in strongSwan, possibly
resulting in Denial of Service or a bypass in authentication restrictions.
<product type="ebuild">strongswan</product>
<announced>December 13, 2014</announced>
<revised>December 13, 2014: 1</revised>
<package name="net-misc/strongswan" auto="yes" arch="*">
<unaffected range="ge">5.1.3</unaffected>
<vulnerable range="lt">5.1.3</vulnerable>
<p>strongSwan is an IPSec implementation for Linux.</p>
<p>A NULL pointer dereference and an error in the IKEv2 implementation have
been found in strongSwan.
<impact type="normal">
<p>A remote attacker could create a Denial of Service condition or bypass
security restrictions.
<p>There is no known workaround at this time.</p>
<p>All strongSwan users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-misc/strongswan-5.1.3"
<uri link="">CVE-2014-2338</uri>
<uri link="">CVE-2014-2891</uri>
<metadata tag="requester" timestamp="Mon, 04 Aug 2014 19:27:51 +0000">
<metadata tag="submitter" timestamp="Sat, 13 Dec 2014 18:56:21 +0000">ackle</metadata>