[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4512-1] strongswan security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4512-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
March 27, 2026                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : strongswan
Version        : 5.9.1-1+deb11u6
CVE ID         : CVE-2026-25075


Kazuma Matsumoto discovered an integer overflow bug in the EAP-TTLS plugin of strongSwan, an IKE/IPsec suite.

The EAP-TTLS plugin doesn't check the length field in the header of
attribute-value pairs (AVPs) tunneled in EAP-TTLS, which can cause an integer underflow that may lead to a crash. An unauthenticated attacker could exploit this for a DoS attack by sending a crafted message.


For Debian 11 bullseye, this problem has been fixed in version
5.9.1-1+deb11u6.

We recommend that you upgrade your strongswan packages.

For the detailed security status of strongswan please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/strongswan

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-----BEGIN PGP SIGNATURE-----
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=QWdT
-----END PGP SIGNATURE-----


Reply to: