strongSwan Vulnerability (CVE-2021-45079)
Posted by tobias |
A vulnerability in the EAP client implementation was discovered in strongSwan. All versions since 4.1.2 are affected.
Posted by tobias |
A vulnerability in the EAP client implementation was discovered in strongSwan. All versions since 4.1.2 are affected.
Posted by tobias |
A denial-of-service vulnerability in the in-memory certificate cache was discovered in strongSwan. All versions since 4.2.10 are affected.
Posted by tobias |
A potential authorization bypass vulnerability in the gmp plugin was discovered in strongSwan. All versions are affected in certain configurations.
Posted by tobias |
A denial-of-service vulnerability in the IKEv2 key derivation if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF was discovered, all strongSwan versions since 5.0.1 may be affected.
Posted by tobias |
A denial-of-service vulnerability in the stroke plugin was discovered in strongSwan. All versions are affected in certain configurations.
Posted by tobias |
A denial-of-service vulnerability in the gmp plugin was discovered in strongSwan. All versions are affected.
Posted by tobias |
A denial-of-service vulnerability in the gmp plugin was discovered in strongSwan. All versions since 4.4.0 are affected.
Posted by tobias |
A denial-of-service vulnerability in the x509 plugin was discovered in strongSwan. All versions are affected.
Posted by tobias |
We are happy to announce the release of strongSwan 5.5.3 which avoids traffic loss during IKEv2 CHILD_SA rekeying, runs on the ARM64 iOS platform, and fixes two vulnerabilities and several other issues.
Posted by tobias |
We are happy to announce the release of strongSwan 5.5.2 which brings support for DH group 31 using Curve25519 and the Ed25519 signature algorithm for IKEv2, storing private keys on a TPM 2.0, automatic installation of bypass policies for LANs, several new features for the VICI interface and swanctl and lots of other new features and fixes.