Fix CVE-2023-26463: strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10. https://github.com/strongswan/strongswan/blob/5.9.11/NEWS https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Yann E. MORIN <yann.morin.1998@free.fr>
8 lines
455 B
Plaintext
8 lines
455 B
Plaintext
# From http://download.strongswan.org/strongswan-5.9.11.tar.bz2.md5
|
|
md5 673e194cd256af77b46928179f2c81ad strongswan-5.9.11.tar.bz2
|
|
# Calculated based on the hash above
|
|
sha256 ddf53f1f26ad26979d5f55e8da95bd389552f5de3682e35593f9a70b2584ed2d strongswan-5.9.11.tar.bz2
|
|
# Locally calculated
|
|
sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING
|
|
sha256 2292e21797754548dccdef9eef6aee7584e552fbd890fa914e1de8d3577d23f0 LICENSE
|