diff options
author | Chris Lamb <lamby@debian.org> | 2023-11-24 14:17:31 +0000 |
---|---|---|
committer | Chris Lamb <lamby@debian.org> | 2023-11-24 14:17:31 +0000 |
commit | d1d64a0d4317c53d9dca4f207d458710dadc4d86 (patch) | |
tree | 3ebbd13c8b2c89fa44192380a1d5dd9ab7e2e947 | |
parent | 88235584e4d7550a8d9e5e3570256edd9e7d0e45 (diff) |
Add DLA-3663-1 for strongswan.
-rw-r--r-- | english/lts/security/2023/dla-3663.data | 9 | ||||
-rw-r--r-- | english/lts/security/2023/dla-3663.wml | 34 |
2 files changed, 43 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3663.data b/english/lts/security/2023/dla-3663.data new file mode 100644 index 00000000000..967d6b56c19 --- /dev/null +++ b/english/lts/security/2023/dla-3663.data @@ -0,0 +1,9 @@ +<define-tag pagetitle>DLA-3663-1 strongswan</define-tag> +<define-tag report_date>2023-11-24</define-tag> +<define-tag secrefs>CVE-2023-41913</define-tag> +<define-tag packages>strongswan</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security diff --git a/english/lts/security/2023/dla-3663.wml b/english/lts/security/2023/dla-3663.wml new file mode 100644 index 00000000000..7f90b3a5141 --- /dev/null +++ b/english/lts/security/2023/dla-3663.wml @@ -0,0 +1,34 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> + +<p>It was discovered that there was a potential buffer overflow in strongswan, +a IPsec-based VPN (Virtual Private Network) server.</p> + +<p>A vulnerability related to processing public Diffie-Hellman key exchange +values could have resulted in a buffer overflow and potentially remote code +execution as a result.</p> + +<ul> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-41913">CVE-2023-41913</a> + + <p>A vulnerability in charon-tkm related to processing DH public values was + discovered in strongSwan that can result in a buffer overflow and + potentially remote code execution. All versions since 5.3.0 are + affected.</p></li> + +</ul> + +<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version +5.7.2-1+deb10u4.</p> + +<p>We recommend that you upgrade your strongswan packages.</p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2023/dla-3663.data" +# $Id: $ |