Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0202-1

Опубликовано: 26 янв. 2022
Источник: suse-cvrf

Описание

Security update for strongswan

This update for strongswan fixes the following issues:

  • CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)

Список пакетов

HPE Helion OpenStack 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP2-BCL
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP3-BCL
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP3-LTSS
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP4-LTSS
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP5
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud 9
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud Crowbar 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud Crowbar 9
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1

Описание

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.


Затронутые продукты
HPE Helion OpenStack 8:strongswan-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.20.1

Ссылки