Описание
Security update for strongswan
This update for strongswan fixes the following issues:
- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
Список пакетов
HPE Helion OpenStack 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP2-BCL
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP3-BCL
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP3-LTSS
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP4-LTSS
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server 12 SP5
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud 9
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud Crowbar 8
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
SUSE OpenStack Cloud Crowbar 9
strongswan-5.1.3-26.20.1
strongswan-doc-5.1.3-26.20.1
strongswan-hmac-5.1.3-26.20.1
strongswan-ipsec-5.1.3-26.20.1
strongswan-libs0-5.1.3-26.20.1
Ссылки
- Link for SUSE-SU-2022:0202-1
- E-Mail link for SUSE-SU-2022:0202-1
- SUSE Security Ratings
- SUSE Bug 1194471
- SUSE CVE CVE-2021-45079 page
Описание
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Затронутые продукты
HPE Helion OpenStack 8:strongswan-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-doc-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-hmac-5.1.3-26.20.1
HPE Helion OpenStack 8:strongswan-ipsec-5.1.3-26.20.1
Ссылки
- CVE-2021-45079
- SUSE Bug 1194471