USN-3771-1: strongSwan vulnerabilities

25 September 2018

strongswan vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in strongSwan.

Software Description

  • strongswan - IPsec VPN solution

Details

It was discovered that strongSwan incorrectly handled IKEv2 key derivation. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2018-10811)

Sze Yiu Chau discovered that strongSwan incorrectly handled parsing OIDs in the gmp plugin. A remote attacker could possibly use this issue to bypass authorization. (CVE-2018-16151)

Sze Yiu Chau discovered that strongSwan incorrectly handled certain parameters fields in the gmp plugin. A remote attacker could possibly use this issue to bypass authorization. (CVE-2018-16152)

It was discovered that strongSwan incorrectly handled the stroke plugin. A local administrator could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2018-5388)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS
libstrongswan - 5.6.2-1ubuntu2.2
strongswan - 5.6.2-1ubuntu2.2
Ubuntu 16.04 LTS
libstrongswan - 5.3.5-1ubuntu3.7
strongswan - 5.3.5-1ubuntu3.7
Ubuntu 14.04 LTS
libstrongswan - 5.1.2-0ubuntu2.10
strongswan - 5.1.2-0ubuntu2.10

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References